screenos reference guide - psychology & · pdf filescreenos reference guide volume 5:...

494
NetScreen Concepts & Examples ScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 P/N 093-1370-000 Rev. A

Upload: habao

Post on 30-Jan-2018

239 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

NetScreen Concepts & Exampleside

ScreenOS 5.1.0

P/N 093-1370-000

Rev. A

ScreenOS Reference Gu

Volume 5: VPNs

Page 2: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

compliance of Class B devices: The enerates and may radiate radio-frequency nce with NetScreen�s installation e with radio and television reception. This d to comply with the limits for a Class B specifications in part 15 of the FCC rules. provide reasonable protection against allation. However, there is no guarantee rticular installation.

interference to radio or television y turning the equipment off and on, the e interference by one or more of the

ing antenna.

en the equipment and receiver.

ienced radio/TV technician for help.

utlet on a circuit different from that to d.

o this product could void the user's device.

ITED WARRANTY FOR THE ET FORTH IN THE INFORMATION PRODUCT AND ARE INCORPORATED OU ARE UNABLE TO LOCATE THE

WARRANTY, CONTACT YOUR OR A COPY.

Copyright NoticeCopyright © 2004 Juniper Networks, Inc. All rights reserved.Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, GigaScreen, and the NetScreen logo are registered trademarks of Juniper Networks, Inc. NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25, NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-Global PRO, NetScreen-Global PRO Express, NetScreen-Remote Security Client, NetScreen-Remote VPN Client, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, GigaScreen ASIC, GigaScreen-II ASIC, and NetScreen ScreenOS are trademarks of Juniper Networks, Inc. All other trademarks and registered trademarks are the property of their respective companies.Information in this document is subject to change without notice.No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from: Juniper Networks, Inc.ATTN: General Counsel1194 N. Mathilda Ave.Sunnyvale, CA 94089-1206

FCC StatementThe following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following information is for FCC equipment described in this manual genergy. If it is not installed in accordainstructions, it may cause interferencequipment has been tested and foundigital device in accordance with the These specifications are designed tosuch interference in a residential instthat interference will not occur in a pa

If this equipment does cause harmfulreception, which can be determined buser is encouraged to try to correct thfollowing measures:

� Reorient or relocate the receiv

� Increase the separation betwe

� Consult the dealer or an exper

� Connect the equipment to an owhich the receiver is connecte

Caution: Changes or modifications twarranty and authority to operate this

DisclaimerTHE SOFTWARE LICENSE AND LIMACCOMPANYING PRODUCT ARE SPACKET THAT SHIPPED WITH THEHEREIN BY THIS REFERENCE. IF YSOFTWARE LICENSE OR LIMITEDNETSCREEN REPRESENTATIVE F

Page 3: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Contents

i

..............................................15................................................... 15

................................................... 19

tography ..........................23

Key Cryptography .................24

..............................................26

..............................................29te Manually .............................. 30l Certificate Request ................. 31g Certificates and CRLs ............. 34uring CRL Settings ...................... 36

ertificate Automatically.............. 38atic Certificate Request ............. 39

Renewal .................................. 43tion............................................. 43

SP .........................................44................................................... 45r OCSP ....................................... 45heck Attributes ........................... 45CSP Responder URL .................... 46 Check Attributes........................ 46

s ............................................47nt Traffic with SSL....................... 48

ation ........................................... 49g Self-Signed

................................................... 51-Defined ficate ......................................... 52

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ContentsPreface .......................................................................... v

Conventions .............................................................. viCLI Conventions........................................................... vi

WebUI Conventions......................................................vii

Illustration Conventions ................................................ ix

Naming Conventions and Character Types ................. x

Juniper Networks NetScreen Documentation ............ xi

Chapter 1 IPSec............................................................1

Introduction to VPNs ...................................................2

IPSec Concepts ..........................................................3Modes...........................................................................4

Transport Mode ......................................................4Tunnel Mode ..........................................................5

Protocols .......................................................................7AH...........................................................................7ESP ..........................................................................8

Key Management.........................................................9Manual Key ............................................................9AutoKey IKE.............................................................9

Security Association ....................................................10

Tunnel Negotiation ...................................................11Phase 1 .......................................................................11

Main Mode and Aggressive Mode.......................12The Diffie-Hellman Exchange ...............................13

Phase 2 .......................................................................13Perfect Forward Secrecy ......................................14Replay Protection .................................................14

IKE and IPSec PacketsIKE Packets ..............

IPSec Packets ..........

Chapter 2 Public Key Cryp

Introduction to Public

PKI...............................

Certificates and CRLs .Obtaining a Certifica

Example: ManuaExample: LoadinExample: Config

Obtaining a Local CExample: Autom

Automatic CertificateKey Pair Genera

Status Check Using OCConfiguring OCSP ...

Specifying CRL oViewing Status CSpecifying an ORemoving Status

Self-Signed CertificateSecuring Manageme

Certificate ValidManually CreatinCertificates........Example: AdminSelf-Signed Certi

Page 4: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Contents

ii

arent Mode, oKey IKE VPN............................ 209

........................................221

............................................222Based Dialup VPN, ................................................. 223Based Dialup VPN, ................................................. 232Based Dialup VPN, ................................................. 243

for Dialup VPN Users ................ 253tional Dialup ................................................. 254

............................................261rtificates ................................... 262ntainer

ypes ......................................... 264 IKE ID (Certificates) .................. 267

shared Keys ............................. 274 IKE ID (Preshared Keys) ............ 276

............................................283 IKE ID (Preshared Keys) ........... 284

........................................293

............................................294

and Decapsulation .............298................................................. 298

................................................. 299

............................................300uring an IP Pool Settings ................................... 301

ec........................................303

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificate Auto-Generation .................................57Deleting Self-Signed Certificates ..........................59

Chapter 3 VPN Guidelines ..........................................61

Cryptographic Options.............................................62Site-to-Site Cryptographic Options..............................63

Dialup VPN Options.....................................................72

Route- and Policy-Based Tunnels..............................80

Packet Flow: Site-to-Site VPN.....................................82

Tunnel Configuration Tips .........................................89

Chapter 4 Site-to-Site VPNs .........................................91

Site-to-Site VPN Configurations .................................92Site-to-Site Tunnel Configuration Steps........................93

Example: Route-Based Site-to-Site VPN, AutoKey IKE...........................................................99Example: Policy-Based Site-to-Site VPN, AutoKey IKE.........................................................113Example: Route-Based Site-to-Site VPN, Dynamic Peer.....................................................124Example: Policy-Based Site-to-Site VPN, Dynamic Peer.....................................................139Example: Route-Based Site-to-Site VPN, Manual Key ........................................................153Example: Policy-Based Site-to-Site VPN, Manual Key ........................................................164

Dynamic IKE Gateways Using FQDN.......................173Aliases.......................................................................174

Example: AutoKey IKE Peer with FQDN................175

VPN Sites with Overlapping Addresses ....................190Example: Tunnel Interface with NAT-Src and NAT-Dst ....................................193

Transparent Mode VPN ...........................................208

Example: TranspPolicy-Based Aut

Chapter 5 Dialup VPNs .....

Dialup VPNs ................Example: Policy-AutoKey IKE .......Example: Route-Dynamic Peer ...Example: Policy-Dynamic Peer ...

Bidirectional PoliciesExample: BidirecVPN Policies.......

Group IKE ID ...............Group IKE ID with Ce

Wildcard and CoASN1-DN IKE ID TExample: Group

Group IKE ID with PreExample: Group

Shared IKE ID ..............Example: Shared

Chapter 6 L2TP..................

Introduction to L2TP ....

Packet Encapsulation Encapsulation .........

Decapsulation.........

L2TP Parameters..........Example: Configand L2TP Default

L2TP and L2TP-over-IPS

Page 5: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Contents

iii

tries.......................................... 369

Entries...................................... 370

e VPNs on One Tunnel rlapping Subnets...................... 372

atic Route and s .............................................. 403

um: OSPF ute Table Entries ...................... 421

ays .....................................424

................................................. 425

sms ........................................... 426

................................................. 426

cedure..................................... 427

ing............................................ 430

dant VPN Gateways ................. 431

havior..................................443

nel Recovery .......................... 443

nel Recovery .......................... 443

ilover to Leased Line ................................................. 445

............................................448

o-Back VPNs ............................. 449

............................................459

d-Spoke VPNs ......................... 460

......................................... IX-I

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Configuring L2TP .................................304

Example: Configuring L2TP-over-IPSec ...............310

Example: Bidirectional L2TP-over-IPSec ..............323

Chapter 7 Advanced VPN Features..........................333

NAT-Traversal ..........................................................335

Probing for NAT .........................................................336

Traversing a NAT Device ...........................................338

UDP Checksum .........................................................341

Keepalive Packets ....................................................341

Initiator/Responder Symmetry ...................................342

Example: Enabling NAT-Traversal........................343

VPN Monitoring .......................................................345

Rekey and Optimization Options ..............................346

Source Interface and Destination Address ...............347

Policy Considerations ...............................................349

Configuring the VPN Monitoring Feature...................349

Example: Specifying Source and Destination Addresses for VPN Monitoring ..........351

Security Consideration for a Route-Based VPN Design .......................................362

SNMP VPN Monitoring Objects and Traps..................364

Multiple Tunnels per Tunnel Interface .....................365

Route-to-Tunnel Mapping .........................................366

Remote Peers� Addresses ..........................................367

Manual and Automatic Table Entries........................369

Manual Table En

Automatic Table

Example: MultiplInterface to Ove

Example: AutomNHTB Table Entrie

Example Addendfor Automatic Ro

Redundant VPN Gatew

VPN Groups .............

Monitoring Mechani

IKE Heartbeats...

IKE Recovery Pro

TCP SYN-Flag Check

Example: Redun

VPN Tunnel Failover Be

Policy-Based VPN Tun

Route-Based VPN Tun

Example: VPN Faor Null Route......

Back-to-Back VPNs......

Example: Back-t

Hub-and-Spoke VPNs..

Example: Hub-an

Index..................................

Page 6: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Contents

iv

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 7: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

v

provide users dialup access to oss the Internet. Secure private etScreen devices provide full

able on NetScreen devices:

s

ic Key Infrastructure (PKI)

ultiple VPN tunnels to a single .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preface

A virtual private network (VPN) is a cost-effective and secure way for corporations tothe corporate network and for remote networks to communicate with each other acrconnections over the Internet are more cost-effective than dedicated private lines. NVPN functions for secure site-to-site and dialup VPN applications.

Volume 5, “VPNs” describes the following VPN concepts and features that are avail

• Internet Key Exchange (IKE) and Internet Protocol Security (IPsec) element

• Certificates and certificate revocation lists (CRLs) within the context of Publ

• Site-to-site VPNs

• Dialup VPNs

• Layer 2 Tunneling Protocol (L2TP) and L2TP-over-IPSec

• Advanced VPN features such as NAT-Traversal, VPN monitoring, binding mtunnel interface, redundant IKE gateways, and VPN tunnel failover behavior

This volume also includes extensive examples for all the above features.

Page 8: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Conventions

vi

llowing sections:

nterface (CLI) command:

r example,

manage

t3 interface”.

for variables, which are always of a NetScreen device.”

ord uniquely. For example, e j12fmt54. Although you can

e presented in their entirety.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CONVENTIONS

This document contains several types of conventions, which are introduced in the fo

• “CLI Conventions”

• “WebUI Conventions” on page vii

• “Illustration Conventions” on page ix

• “Naming Conventions and Character Types” on page x

CLI ConventionsThe following conventions are used when presenting the syntax of a command line i

• Anything inside square brackets [ ] is optional.

• Anything inside braces { } is required.

• If there is more than one choice, each choice is separated by a pipe ( | ). Fo

set interface { ethernet1 | ethernet2 | ethernet3 }

means “set the management options for the ethernet1, ethernet2, or etherne

• Variables appear in italic. For example:

set admin user name password

When a CLI command appears within the context of a sentence, it is in bold (exceptin italic). For example: “Use the get system command to display the serial number

Note: When typing a keyword, you only have to type enough letters to identify the wtyping set adm u joe j12fmt54 is enough to enter the command set admin user jouse this shortcut when entering commands, all the commands documented here ar

Page 9: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Conventions

vii

I by clicking menu options and Objects > Addresses > List >

ble appears.

nfiguration dialog box

4

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI ConventionsThroughout this book, a chevron ( > ) is used to indicate navigation through the WebUlinks. For example, the path to the address configuration dialog box is presented as New. This navigational sequence is shown below.

1. Click Objects in the menu column.The Objects menu option expands to reveal a subset of options for Objects.

2. (Applet menu) Hover the mouse over Addresses .(DHTML menu) Click Addresses .The Addresses option expands to reveal a subset of options for Addresses.

3. Click List .The address book ta

4. Click the New link.The new address coappears.

1

2

3

Page 10: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Conventions

viii

ox where you can then define parts: a navigational path and to the address configuration

Note: Because there are no instructions for the Comment field, leave it as it is.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To perform a task with the WebUI, you must first navigate to the appropriate dialog bobjects and set parameters. The set of instructions for each task is divided into two configuration details. For example, the following set of instructions includes the pathdialog box and the settings for you to configure:

Objects > Addresses > List > New: Enter the following, and then click OK :Address Name: addr_1IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.5/32Zone: Untrust

Zone: Untrust

Click OK .

Address Name: addr_1

IP Address Name/Domain Name:

IP/Netmask: (select), 10.2.2.5/32

Page 11: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Conventions

ix

out this book:

ocal Area Network (LAN) ith a Single Subnet

example: 10.1.1.0/24)

nternet

esktop Computer

erver

eneric Network Deviceexamples: NAT server, ccess Concentrator)

aptop Computer

ynamic IP (DIP) Pool

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Illustration ConventionsThe following graphics make up the basic set of images used in illustrations through

Generic NetScreen Device

Security Zone

Security Zone InterfacesWhite = Protected Zone Interface(example: Trust Zone)Black = Outside Zone Interface(example: Untrust Zone)

Router Icon

Switch Icon

Virtual Routing Domain

VPN Tunnel

Lw(

I

D

S

G(A

Tunnel Interface

L

D

Page 12: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Conventions

x

as addresses, admin users, creenOS configurations.

osed within double quotes ( “ );

tes; for example, “ local LAN ”

ensitive. For example, “local

. Examples of SBCS are ASCII, e character sets (DBCS)—are

quotes ( “ ), which have special ludes spaces.

h SBCS and MBCS, depending

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Naming Conventions and Character TypesScreenOS employs the following conventions regarding the names of objects—suchauth servers, IKE gateways, virtual systems, VPN tunnels, and zones—defined in S

• If a name string includes one or more spaces, the entire string must be enclfor example, set address trust “local LAN” 10.1.1.0/24.

• NetScreen trims any spaces leading or trailing text within a set of double quobecomes “local LAN” .

• NetScreen treats multiple consecutive spaces as a single space.

• Name strings are case sensitive, although many CLI key words are case insLAN” is different from “local lan”.

ScreenOS supports the following character types:

• Single-byte character sets (SBCS) and multiple-byte character sets (MBCS)European, and Hebrew. Examples of MBCS—also referred to as double-bytChinese, Korean, and Japanese.

• ASCII characters from 32 (0x20 in hexidecimals) to 255 (0xff), except doublesignificance as an indicator of the beginning or end of a name string that inc

Note: A console connection only supports SBCS. The WebUI supports boton the character sets that your Web browser supports.

Page 13: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Juniper Networks NetScreen Documentation

xi

t www.juniper.net/techpubs/.

w.juniper.net/support/ or call tates).

-mail address below:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

JUNIPER NETWORKS NETSCREEN DOCUMENTATION

To obtain technical documentation for any Juniper Networks NetScreen product, visi

For technical support, open a support case using the Case Manager link at http://ww1-888-314-JTAC (within the United States) or 1-408-745-9500 (outside the United S

If you find any errors or omissions in the following content, please contact us at the e

[email protected]

Page 14: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Preface Juniper Networks NetScreen Documentation

xii

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 15: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

1

1

Chapter 1

nd how they relate to virtual remainder of the chapter covers

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IPSec

This chapter introduces the various elements of Internet Protocol Security (IPSec) aprivate network (VPN) tunneling. Following an “Introduction to VPNs” on page 2, the the following elements of IPSec:

• “IPSec Concepts” on page 3

– “Modes” on page 4

– “Protocols” on page 7

– “Key Management” on page 9

– “Security Association” on page 10

• “Tunnel Negotiation” on page 11

– “Phase 1” on page 11

– “Phase 2” on page 13

• “IKE and IPSec Packets” on page 15

– “IKE Packets” on page 15

– “IPSec Packets” on page 19

Page 16: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec Introduction to VPNs

2

en remote computers across a

nd a LAN. The traffic that flows s, and other network equipment the WAN, the two participants

at each end of the tunnel—that ocol (Authentication Header or

rigin authentication)

ticate the IP packet source and n the other hand, if you are only authentication mechanisms. designers choose to encrypt,

y creation mechanisms:

Sec connection.

re about the IPSec security

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

INTRODUCTION TO VPNSA virtual private network (VPN) provides a means for securely communicating betwepublic wide area network (WAN), such as the Internet.

A VPN connection can link two local area networks (LANs) or a remote dialup user abetween these two points passes through shared resources such as routers, switchethat make up the public WAN. To secure VPN communication while passing throughcreate an IP Security (IPSec) tunnel1.

An IPSec tunnel consists of a pair of unidirectional Security Associations (SAs)—onespecify the security parameter index (SPI), destination IP address, and security protEncapsulating Security Payload) employed.

Through the SA, an IPSec tunnel can provide the following security functions:

• Privacy (via encryption)

• Content integrity (via data authentication)

• Sender authentication and—if using certificates—nonrepudiation (via data o

The security functions you employ depend on your needs. If you only need to authencontent integrity, you can authenticate the packet without applying any encryption. Oconcerned with preserving privacy, you can encrypt the packet without applying anyOptionally, you can both encrypt and authenticate the packet. Most network securityauthenticate, and replay-protect their VPN traffic.

NetScreen supports IPSec technology for creating VPN tunnels with two kinds of ke

• Manual Key

• AutoKey IKE with a preshared key or a certificate

1. The term “tunnel” does not denote either transport or tunnel mode (see “Modes” on page 4). It simply refers to the IP

Note: For more information on SPIs, see �Security Association� on page 10. For moprotocols, see �Protocols� on page 7.

Page 17: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

3

munications at the IP packet

lating Security Payload (ESP)

ssociations (SAs) and key OI). See RFC 2407 and 2408.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IPSEC CONCEPTSIP Security (IPSec) is a suite of related protocols for cryptographically securing comlayer. IPSec consists of two modes and two main protocols:

• Transport and tunnel modes

• The Authentication Header (AH) protocol for authentication and the Encapsuprotocol for encryption (and authentication)

IPSec also provides methods for the manual and automatic negotiation of Security Adistribution, all the attributes for which are gathered in a Domain of Interpretation (D

IPSec Architecture

ESP ProtocolAH Protocol

Authentication Algorithm(MD5, SHA-1)

Encryption Algorithm(DES, 3DES)

Domain of Interpretation(DOI)

SA and Key Management(Manual and Automatic)

Tunnel ModeTransport Mode

Note: NetScreen does not support Transport Mode with AH.

Page 18: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

4

nnel are hosts, you can use ecurity gateway, such as a unnel mode for IPSec tunnels

et can be authenticated (with laintext as it is sent across the

s for all the security parameters s required for SA and IKE

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ModesIPSec operates in one of two modes: transport and tunnel. When both ends of the tutransport mode or tunnel mode. When at least one of the endpoints of a tunnel is a srouter or firewall, you must use tunnel mode. NetScreen devices always operate in tand transport mode for L2TP-over-IPSec tunnels.

Transport ModeThe original IP packet is not encapsulated within another IP packet. The entire packAH), the payload can be encrypted (with ESP), and the original header remains in pWAN.

Note: The IPSec Domain of Interpretation (DOI) is a document containing definitionrequired for the successful negotiation of a VPN tunnel�essentially, all the attributenegotiations.

Payload

Payload

AHHeader

ESPHeader

OriginalHeader

OriginalHeader

Authenticated

Authenticated Encrypted

Transport Mode � AH

Transport Mode � ESP

IP Packets

Transport Mode � AH

Page 19: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

5

IP payload and a new header ith AH, the AH and new

d.

are the IP addresses of the t mode); the source and endpoints of the connection.

enticated

cketed.

enticated

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Tunnel ModeThe entire original IP packet—payload and header—is encapsulated within another appended to it. The entire original packet can be encrypted, authenticated, or both. Wheaders are also authenticated. With ESP, the ESP header can also be authenticate

In a site-to-site VPN, the source and destination addresses used in the new header outgoing interface (in NAT or Route mode) or the VLAN1 IP address (in Transparendestination addresses of the encapsulated packets are the addresses of the ultimate

Payload

Payload

AHHeader

ESPHeader

OriginalHeader

NewHeader

NewHeader

OriginalHeader

Auth Encrypted

Tunnel Mode � AH

Tunnel Mode � ESP

IP PacketsThe original pa

is encapsulat

Auth

Page 20: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

6

l; the tunnel extends directly to der and the encapsulated

rtual inner IP address is the source IP assigns the dialup client is the source

oad

oad

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

In a dialup VPN, there is no tunnel gateway on the VPN dialup client end of the tunnethe client itself. In this case, on packets sent from the dialup client, both the new heaoriginal header have the same IP address: that of the client’s computer2.

2. Some VPN clients such as the NetScreen-Remote allow you to define a virtual inner IP address. In such cases, the viaddress in the original packet header of traffic originating from the client, and the IP address that the ISP dynamically IP address in the outer header.

Internet

LAN LANTunnel

NetScreen-ATunnel Gateway

NetScreen-BTunnel Gateway

A A A BBB 1 2Payload Payload PaylA B

1 2

The original packetis encapsulated.

Site-to-Site VPN in Tunnel Mode

Internet

LANTunnel

NetScreen-BTunnel Gateway

A A A BBB 1 2Payload Payload Payl

A = 1B

2

The original packetis encapsulated.

VPN Dialup Client

Dialup VPN in Tunnel Mode

Page 21: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

7

e of an IP packet and verifying

e entire IP packet (and

/integrity of the content and hash-based message

tions.

ash (also called a digital yte key. The resulting hash is and integrity.

hash from a message of han MD5 because of the larger tScreen ASIC, the performance

ng RFCs: (MD5) 1321, 2403;

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ProtocolsIPSec uses two protocols to secure communications at the IP layer:

• Authentication Header (AH)—A security protocol for authenticating the sourcthe integrity of its content

• Encapsulating Security Payload (ESP)—A security protocol for encrypting thauthenticating its content)

AHThe Authentication Header (AH) protocol provides a means to verify the authenticityorigin of a packet. You can authenticate the packet by the checksum calculated via aauthentication code (HMAC) using a secret key and either MD5 or SHA-1 hash func

Message Digest version 5 (MD5)—An algorithm that produces a 128-bit hsignature or message digest) from a message of arbitrary length and a 16-bused, like a fingerprint of the input, to verify content and source authenticity

Secure Hash Algorithm-1 (SHA-1)—An algorithm that produces a 160-bit arbitrary length and a 20-byte key. It is generally regarded as more secure thashes it produces. Because the computational processing is done in the Necost is negligible.

Note: For more information on MD5 and SHA-1 hashing algorithms, see the followi(SHA-1) 2404. For information on HMAC, see RFC 2104.

Page 22: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

8

acy (encryption), and source es the entire IP packet (header new IP header contains the

encryption, you can choose

56-bit key.

DES algorithm is applied in avings but is considered

which, when adopted by r network security devices.

owever, you cannot select

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ESPThe Encapsulating Security Payload (ESP) protocol provides a means to ensure privauthentication and content integrity (authentication). ESP in tunnel mode encapsulatand payload), and then appends a new IP header to the now encrypted packet. Thisdestination address needed to route the protected data through the network.

With ESP, you can encrypt and authenticate, encrypt only, or authenticate only. For either of the following encryption algorithms:

Data Encryption Standard (DES)—A cryptographic block algorithm with a

Triple DES (3DES)—A more powerful version of DES in which the original three rounds, using a 168-bit key. DES provides a significant performance sunacceptable for many classified or sensitive material transfers.

Advanced Encryption Standard (AES)—An emerging encryption standardInternet infrastructures worldwide, will offer greater interoperability with otheNetScreen supports AES with 128-, 192-, and 256-bit keys.

For authentication, you can use either MD5 or SHA-1 algorithms.

For either the encryption or authentication algorithm you can select NULL ; hNULL for both simultaneously.

Page 23: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

9

Sec supports both manual and

parameters. This is a viable g of keys are not difficult. s security issues. Aside from t been compromised while in curity issues as when you

es not require you to configure of keys and security h automated tunnel negotiation ith certificates.

n IKE session, each side must ard, the issue of secure key , an AutoKey, unlike a Manual

IKE protocol. Frequently reduces key-management re, doing so too often can

nication.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Key ManagementThe distribution and management of keys are critical to successfully using VPNs. IPautomatic key distribution methods.

Manual KeyWith Manual Keys, administrators at both ends of a tunnel configure all the security technique for small, static networks where the distribution, maintenance, and trackinHowever, safely distributing Manual Key configurations across great distances posepassing the keys face-to-face, you cannot be completely sure that the keys have notransit. Also, whenever you want to change the key, you are faced with the same seinitially distributed it.

AutoKey IKEWhen you need to create and manage numerous tunnels, you need a method that doevery element manually. IPSec supports the automated generation and negotiation associations using the Internet Key Exchange (IKE) protocol. NetScreen refers to sucas AutoKey IKE and supports AutoKey IKE with preshared keys and AutoKey IKE w

AutoKey IKE with Preshared Keys

With AutoKey IKE using preshared keys to authenticate the participants in aconfigure and securely exchange the preshared key3 in advance. In this regdistribution is the same as that with Manual Keys. However, once distributedKey, can automatically change its keys at predetermined intervals using thechanging keys greatly improves security, and automatically doing so greatlyresponsibilities. However, changing keys increases traffic overhead; thereforeduce data transmission efficiency.

3. A preshared key is a key for both encryption and decryption that both participants must have before initiating commu

Page 24: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IPSec Concepts

10

KE negotiation, each side y” on page 23) and acquires a certificate authority (CA) is verify the peer’s signature. ly.

nts regarding the methods and ation requires at least two SAs,

For inbound traffic, the rity protocol (AH or ESP), and

�Site-to-Site VPNs� on page 91.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

AutoKey IKE with Certificates

When using certificates to authenticate the participants during an AutoKey Igenerates a public/private key pair (see Chapter 2, “Public Key Cryptographcertificate (see “Certificates and CRLs” on page 29). As long as the issuing trusted by both sides, the participants can retrieve the peer’s public key andThere is no need to keep track of the keys and SAs; IKE does it automatical

Security AssociationA security association (SA) is a unidirectional agreement between the VPN participaparameters to use in securing a communication channel. Full bidirectional communicone for each direction.

An SA groups together the following components for securing communications:

– Security algorithms and keys

– Protocol mode (transport or tunnel)

– Key management method (Manual Key or AutoKey IKE)

– SA lifetime

For outbound VPN traffic, the policy invokes the SA associated with the VPN tunnel.NetScreen device looks up the SA by using the following triplet: destination IP, secusecurity parameter index (SPI) value.

Note: For examples of both Manual Key and AutoKey IKE tunnels, see Chapter 4,

Page 25: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec Tunnel Negotiation

11

ters have been previously lready been established. When nnel, the NetScreen device e destination gateway.

the IPSec SAs.

enticating the ensuing

for how to authenticate and Main mode (see below). Using ch as:

and SHA-1). For more

ccept at least one set of the support up to four proposals for meters for key negotiation you

2-des-md5

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

TUNNEL NEGOTIATIONFor a Manual Key IPSec tunnel, because all of the security association (SA) paramedefined, there is no need to negotiate which SAs to use. In essence, the tunnel has atraffic matches a policy using that Manual Key tunnel or when a route involves the tusimply encrypts and authenticates the data, as you determined, and forwards it to th

To establish an AutoKey IKE IPSec tunnel, two phases of negotiation are required:

• In Phase 1, the participants establish a secure channel in which to negotiate

• In Phase 2, the participants negotiate the IPSec SAs for encrypting and authexchanges of user data.

Phase 1Phase 1 of an AutoKey IKE tunnel negotiation consists of the exchange of proposalssecure the channel. The exchange can be in one of two modes: Aggressive mode oreither mode, the participants exchange proposals for acceptable security services su

• Encryption algorithms (DES and 3DES) and authentication algorithms (MD5information about these algorithms, see “Protocols” on page 7.

• A Diffie-Hellman Group (See “The Diffie-Hellman Exchange” on page 13.)

• Preshared Key or RSA/DSA certificates (see “AutoKey IKE” on page 9)

A successful Phase 1 negotiation concludes when both ends of the tunnel agree to aPhase 1 security parameters proposed, and then process them. NetScreen devices Phase 1 negotiations, allowing you to define how restrictive a range of security parawill accept.

The predefined Phase 1 proposals that NetScreen provides are as follows:

• Standard: pre-g2-aes128-sha and pre-g2-3des-sha

• Compatible: pre-g2-3des-sha, pre-g2-3des-md5, pre-g2-des-sha, and pre-g

• Basic: pre-g1-des-sha and pre-g1-des-md5

You can also define custom Phase 1 proposals.

Page 26: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec Tunnel Negotiation

12

e described below.

s total) to accomplish the

d authentication algorithms.

, and the initiator and recipient

ncryption algorithm established clear.

nly in two exchanges, and a

ange, and sends a nonce and

and sends a nonce, its IKE

nge, and, if using certificates,

ages), Aggressive mode does

key, Aggressive mode must be domain name (FQDN), or an IP ut not an IP address.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Main Mode and Aggressive ModePhase 1 can take place in either Main mode or Aggressive mode. The two modes ar

Main Mode: The initiator and recipient send three two-way exchanges (six messagefollowing services:

• First exchange, (messages 1 and 2): Propose and accept the encryption an

• Second exchange, (messages 3 and 4): Execute a Diffie-Hellman exchangeeach provide a nonce (randomly generated number).

• Third exchange, (messages 5 and 6): Send and verify their identities.

The information transmitted in the third exchange of messages is protected by the ein the first two exchanges. Thus, the participants’ identities are not transmitted in the

Aggressive Mode: The initiator and recipient accomplish the same objectives, but ototal of three messages:

• First message: The initiator proposes the SA, initiates a Diffie-Hellman exchits IKE identity.

• Second message: The recipient accepts the SA, authenticates the initiator, identity, and, if using certificates, the recipient’s certificate.

• Third message: The initiator authenticates the recipient, confirms the exchasends the initiator’s certificate.

Because the participants’ identities are exchanged in the clear (in the first two messnot provide identity protection.

Note: When a dialup VPN user negotiates an AutoKey IKE tunnel with a preshared used. Note also that a dialup VPN user can use an e-mail address, a fully qualified address as its IKE ID. A dynamic peer can use either an e-mail address or FQDN, b

Page 27: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec Tunnel Negotiation

13

The strength of the technique is ithout passing the secret value

ups 1, 2, and 5). The size of the

ever, the larger the modulus, up is a different size, the

ceed through Phase 2, in which l.

h security parameters to psulating Security Payload orithms. The proposal can also

nd involves the exchange of

osals. The same guideline applies to

ove. For more about PFS, see

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The Diffie-Hellman ExchangeA Diffie-Hellman exchange allows the participants to produce a shared secret value. that it allows the participants to create the secret value over an unsecured medium wthrough the wire. There are five Diffie-Hellman (DH) groups (NetScreen supports groprime modulus used in each group’s calculation differs as follows:

• DH Group 1: 768-bit modulus4

• DH Group 2: 1024-bit modulus

• DH Group 5: 1536-bit modulus

The larger the modulus, the more secure the generated key is considered to be; howthe longer the key-generation process takes. Because the modulus for each DH groparticipants must agree to use the same group5.

Phase 2After the participants have established a secure and authenticated channel, they prothey negotiate the SAs to secure the data to be transmitted through the IPSec tunne

Like the process for Phase 1, the participants exchange proposals to determine whicemploy in the SA. A Phase 2 proposal also includes a security protocol—either Enca(ESP) or Authentication Header (AH), and selected encryption and authentication algspecify a Diffie-Hellman group, if Perfect Forward Secrecy (PFS) is desired.

Regardless of the mode used in Phase 1, Phase 2 always operates in Quick mode athree messages5.

4. The strength of DH Group 1 security has depreciated, and Juniper Networks does not recommend its use.

5. If you configure multiple (up to four) proposals for Phase 1 negotiations, use the same Diffie-Hellman group in all propmultiple proposals for Phase 2 negotiations.

Note: For more about Diffie-Hellman groups, see �The Diffie-Hellman Exchange� ab�Perfect Forward Secrecy� on page 14.

Page 28: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec Tunnel Negotiation

14

ou to define how restrictive a tion feature. Use of this feature rs. You simply have the option tion, see below.)

, and nopfs-esp-des-md5

isting of local IP address–hat the service specified in the peer must be the same as the

from and unrelated to the key) from which all Phase 2 f CPU processing. ncryption keys are

cur for each Phase 2 tunnel. ake slightly longer with PFS

later either to flood the system, protection feature enables . If packets arrive outside a

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen devices support up to four proposals for Phase 2 negotiations, allowing yrange of tunnel parameters you will accept. NetScreen also provides a replay protecdoes not require negotiation because packets are always sent with sequence numbeof checking the sequence numbers or not. (For more information about replay protec

The predefined Phase 2 proposals that NetScreen provides are as follows:

• Standard: g2-esp-3des-sha and g2-esp-aes128-sha

• Compatible: nopfs-esp-3des-sha, nopfs-esp-3des-md5, nopfs-esp-des-sha

• Basic: nopfs-esp-des-sha and nopfs-esp-des-md5

You can also define custom Phase 2 proposals.

In Phase 2, the peers also exchange proxy IDs. A proxy ID is a three-part tuple consremote IP address–service. The proxy ID for both peers must match, which means tproxy ID for both peers must be the same, and the local IP address specified for oneremote IP address specified for the other peer.

Perfect Forward SecrecyPerfect Forward Secrecy (PFS) is a method for deriving Phase 2 keys independent preceding keys. Alternatively, the Phase 1 proposal creates the key (the SKEYID_dkeys are derived. The SKEYID_d key can generate Phase 2 keys with a minimum oUnfortunately, if an unauthorized party gains access to the SKEYID_d key, all your ecompromised.

PFS addresses this security risk by forcing a new Diffie-Hellman key exchange to ocUsing PFS is thus more secure, although the rekeying procedure in Phase 2 might tenabled.

Replay ProtectionA replay attack occurs when somebody intercepts a series of packets and uses themcausing a denial-of-service (DoS), or to gain entry to the trusted network. The replayNetScreen devices to check every IPSec packet to see if it has been received beforespecified sequence range, the NetScreen device rejects them.

Page 29: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

15

define the parameters for SAs manually, or the SAs can se 1 can occur in either Main

ints by using the security up. IPSec can be applied in one two IPSec protocols—

tages of a VPN tunnel, please c.

no active Phase 2 SA exists for he source and destination

espectively. In the IP packet at for IKE packets is the same

e NetScreen device, IKE negotiations rwarding it.

s.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IKE AND IPSEC PACKETSAn IPSec VPN tunnel consists of two major elements:

• Tunnel Setup: The peers first establish security associations (SAs), which securing traffic between themselves. The admins at each end can define thebe defined dynamically through IKE Phase 1 and Phase 2 negotiations. Phamode or Aggressive mode. Phase 2 always occurs in Quick mode.

• Applied Security: IPSec protects traffic sent between the two tunnel endpoparameters defined in the SAs that the peers agreed to during the tunnel setof two modes—Transport mode and Tunnel mode. Both modes support the Encapsulating Security Payload (ESP) and Authentication Header (AH).

To help demystify the the packet processing that occurs during the IKE and IPSec srefer to the following sections, which show the packet headers for both IKE and IPSe

IKE PacketsWhen a clear-text packet arrives at the NetScreen device that requires tunneling andthat tunnel, the NetScreen device begins IKE negotiations (and drops the packet6). Taddresses in the IP packet header are those of the local and remote IKE gateways rpayload, there is a UDP segment encapsulating an ISAKMP (IKE) packet. The formfor Phase 1 and Phase 2.

6. When the initial IP packet is dropped, the source host resends it. Typically, by the time the second packet reaches thare complete and the NetScreen device protects it—and all subsequent packets in the session—with IPSec before fo

IKE Packet(For Phases 1 and 2)

UDPHeader

IPHeader

ISAKMPHeader Payload

Note: ISAKMP is the packet format that IKE use

Page 30: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

16

um

in Bytes)

et

Padding

for IKE)

Flags

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Version

Header Checks

Destination Address (Remote Peer�s Gateway)

IP Options (if any)

IP Payload

IP Header

Source Address (Local Peer�s Gateway)

Identification

Header Length Type of Service Total Packet Length (

0 D M Fragment Offs

Time to Live (TTL) Protocol (17 for UDP)

UDP Payload

UDP Header

Length

Source Port (500 for IKE)

Checksum

Destination Port (500

Message Length

ISAKMP Payload

ISAKMP Header (for IKE)

Message ID

Responder�s Cookie (0000 for the first packet)

Initiator�s Cookie

Next Payload Maj Ver Min Ver Exchange Type

Page 31: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

17

es:

2 SA

oposal payload which gets

orm a key exchange, such as a

er ID

r responder

SN.1_DN.

h function

for the exchange)

otiations. NetScreen uses it to

Bytes)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The Next Payload field contains a number indicating one of the following payload typ

• 0002 – SA Negotiation Payload; contains a definition for a Phase 1 or Phase

• 0004 – Proposal Payload; can be a Phase 1 or Phase 2 proposal

• 0008 – Transform Payload; the transform payload gets encapsulated in a prencapsulated in an SA payload

• 0010 – Key Exchange (KE) Payload; contains information necessary to perfDiffie-Hellman public value

• 0020 – Identification (IDx) Payload

– In Phase 1, IDii indicates the initiator ID, and IDir indicates the respond

– In Phase 2, IDui indicates the user initiator, and IDur indicates the use

The IDs are IKE ID types such as FQDN, U-FQDN, IP address, and A

• 0040 – Certificate (CERT) Payload

• 0080 – Certificate Request (CERT_REQ) Payload

• 0100 – Hash (HASH) Payload; contains the digest output of a particular has

• 0200 – Signature (SIG) Payload; contains a digital signature

• 0400 – Nonce (Nx) Payload; contains some pseudo-random info necessary

• 0800 – Notify Payload

• 1000 – ISAKMP Delete Payload

• 2000 – Vendor ID (VID) Payload; can be included anywhere in Phase 1 negmark support for NAT-T.

Each ISAKMP payload begins with the same generic header:

Next Header

Payload

Generic ISAKMP Payload Header

Reserved Payload Length (in

Page 32: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

18

d type indicated by the value in ollowing diagram for an

Flags

h

th

ISAKMP Header

SAPayload

Proposal Payload

Transform Payload

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

There can be multiple ISAKMP payloads chained together, each subsequent payloathe Next Header field. A value of 0000 indicates the last ISAKMP payload. See the fexample:

Total Message Length

Message ID

Responder�s SPI (0000 for the first packet)

Initiator�s SPI

Next Payload(0002 for SA) Maj Ver Min Ver Exchange Type

Next Header(0004 for Proposal)

SA Payload

Reserved SA Payload Length

Proposal Payload

Reserved Proposal Payload Lengt

Transform Payload

Reserved Transform Payload Leng

Next Header(0008 for Transform)

Next Header(0000 for End)

ISAKMP Header with Generic ISAKMP Payloads

Page 33: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

19

1 and Phase 2 security ear-text IP packets that hosts icies permit the traffic). If the e packet looks like the one riginal packet that the initiating

des the payload, the TCP

s of the remote gateway as the ce IP address. The NetScreen eader contains information that

.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IPSec PacketsAfter IKE negotiations complete and the two IKE gateways have established Phase associations (SAs), the NetScreen device applies IPSec protection to subsequent clbehind one IKE gateway send to hosts behind the other gateway (assuming that polPhase 2 SA specifies the Encapsulating Security Protocol (ESP) in Tunnel mode, thshown below7. Note that the NetScreen device adds two additional headers to the ohost sends.

As shown in the above illustration, the packet that the initiating host constructs incluheader, and the inner IP header (IP1).

The outer IP header (IP2), which the NetScreen device adds, contains the IP addresdestination IP address and the IP address of the local NetScreen device as the sourdevice also adds an ESP header between the outer and inner IP headers. The ESP hallows the remote peer to properly process the packet when it receives it.

7. For information about ESP, see “ESP” on page 8. For information about Tunnel mode, see “Tunnel Mode” on page 5

IPSec Packet � Encapsulating Security Payload (ESP) in Tunnel Mode

IP2Header

ESPHeader

IP1Header

TCPHeader Payload

Original PacketSent by Initiating Host

IPSec PacketSent by IKE Gateway

The local gateway adds these headers to the packet.

Page 34: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

20

, this value is 4, indicating rotocol such as 6 for TCP or 17

um

in Bytes)

et

Padding

t Header (4 for IP)*�

Authen-ticated

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The Next Header field indicates the type of data in the payload field. In Tunnel modeIP-in-IP. If ESP is applied in Transport mode, this value indicates a Transport layer pfor UDP.

Version

Header Checks

Destination Address (Remote Peer�s Gateway)

IP Options (if any)

Payload

Outer IP Header (IP2)

Source Address (Local Peer�s Gateway)

Identification

Header Length Type of Service Total Packet Length (

0 D M Fragment Offs

Time to Live (TTL) Protocol (50 for ESP)

Padding Length*�

Payload Data*� (variable)

ESP Header

Remote Peer�s Security Parameters Index (SPI)*

NexPadding*� (0-255 bytes)

Sequence Number*

Initialization Vector* (IV) � First 8 octets of data field

Authentication Data (variable)

* = Authenticated sections of the packet� = Encrypted sections of the packet

Encrypted

Page 35: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

21

um

in Bytes)

et

Padding

rt

r

Padding

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Version

Header Checks

Destination Address (Receiving Host)

IP Options (if any)

Payload

Inner IP Header (IP1)

Source Address (Initiating Host)

Identification

Header Length Type of Service Total Packet Length (

0 D M Fragment Offs

Time to Live (TTL) Protocol (6 for TCP)

Source Port Destination Po

Sequence Number

Acknowledgement Number

U R G

A C K

P S H

R S T

Urgent Pointe

Window SizeHeader Length Reserved

Options (if any)

Data

S Y N

F I N

TCP Header

Checksum

Page 36: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 1 IPSec IKE and IPSec Packets

22

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 37: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

2

23

icates and certificate revocation anized into the following

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Chapter 2

Public Key Cryptography

This chapter provides an introduction to public key cryptography and the use of certiflists (CRLs) within the context of Public Key Infrastructure (PKI). The material is orgsections:

• “Introduction to Public Key Cryptography” on page 24

• “PKI” on page 26

• “Certificates and CRLs” on page 29

– “Obtaining a Certificate Manually” on page 30

– “Obtaining a Local Certificate Automatically” on page 38

– “Automatic Certificate Renewal” on page 43

• “Status Check Using OCSP” on page 44

– “Configuring OCSP” on page 45

• “Self-Signed Certificates” on page 47

– “Securing Management Traffic with SSL” on page 48

Page 38: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Introduction to Public Key Cryptography

24

ata. Data encrypted with a the corresponding private key, b an encrypted message, Alice ge with his private key.

it with the corresponding public ent her identity as the sender of e to Bob. Bob then decrypts the

he procedure for signing a nt):

y using a hash algorithm (MD5

ey. The result is a digital

ed it.

est by applying the same hash

enerated. If the two digests xtension, the integrity of the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHYIn public key cryptography, a public/private key pair is used to encrypt and decrypt dpublic key, which the owner makes available to the public, can only be decrypted withwhich the owner keeps secret and protected. For example, if Alice wants to send Bocan encrypt it with Bob’s public key and send it to him. Bob then decrypts the messa

The reverse is also useful; that is, encrypting data with a private key and decrypting key. This is known as creating a digital signature. For example, if Alice wants to presa message, she can encrypt the message with her private key and send the messagmessage with Alice’s public key, thus verifying that Alice is indeed the sender.

Public/private key pairs also play an important role in the use of digital certificates. Tcertificate (by a CA) and then verifying the signature works as follows (by the recipie

Signing a Certificate

1. The Certificate Authority (CA) that issues a certificate hashes the certificate bor SHA-1) to generate a digest.

2. The CA then “signs” the certificate by encrypting the digest with its private ksignature.

3. The CA then sends the digitally signed certificate to the person who request

Verifying a Digital Signature

1. When the recipient gets the certificate, he or she also generates another digalgorithm (MD5 or SHA-1) on the certificate file.

2. The recipient uses the CA’s public key to decrypt the digital signature.

3. The recipient compares the decrypted digest with the digest he or she just gmatch, the recipient can confirm the integrity of the CA’s signature and, by eaccompanying certificate.

Page 39: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Introduction to Public Key Cryptography

25

E session works very similarly,

the data in the IP packet

nder’s public/private key pair.

h Algorithm5 or SHA-1)

sh Algorithm5 or SHA-1)

Cert

Cert

A�s Private Key

�s Public Key

Digest B

Digest B

1

1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The procedure for digitally signing messages sent between two participants in an IKwith the following differences:

• Instead of making a digest from the CA certificate, the sender makes it frompayload.

• Instead of using the CA’s public/private key pair, the participants use the se

Digest A

Digest A

Has(MD

Ha(MD

C

CA

1. Using either the MD5 or SHA-1 hash algorithm, the CA makes digest A from the certificate.

2. Using the its private key, the CA encrypts digest A. The result is digest B, the digital signature.

3. The CA sends the digitally signed certificate to the person who requested it.

2

3

2

Compare

1. Using either MD5 or SHA-1, the recipient makes digest A from the certificate.

2. Using the CA�s public key, the recipient decrypts digest B.3. The recipient compares digest A with digest B. If they

match, the recipient knows that the certificate has not been tampered with.

Sender (CA)

Recipient

Page 40: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography PKI

26

equired for the successful te, you must be able to track a

ty of a CA domain.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

PKIThe term Public Key Infrastructure (PKI) refers to the hierarchical structure of trust rimplementation of public key cryptography. To verify the trustworthiness of a certificapath of certified CAs from the one issuing your local certificate back to a root authori

The root level CA validates subordinate CAs.

Subordinate CAs validate

local certificates and other CAs.

Local certificates contain the user�s public key.

PKI Hierarchy of Trust � CA Domain

Page 41: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography PKI

27

wn CA domain within which a ion later wants its employees to le, with employees at another

cation; that is, they can agree to cally but horizontally.

nted. Toward this goal, the

t file for transmission to a

B

ers .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

If certificates are used solely within an organization, that organization can have its ocompany CA issues and validates certificates among its employees. If that organizatbe able to exchange their certificates with those from another CA domain (for examporganization that also has its own CA domain), the two CAs can develop cross-certifitrust the authority of each other. In this case, the PKI structure does not extend verti

For convenience and practicality, PKI must be transparently managed and implemeNetScreen ScreenOS does the following:

1. Generates a public/private key pair when you create a certificate request.

2. Supplies that public key as part of the certificate request in the form of a texCertificate Authority (CA) for certificate enrollment (PKCS10 file).

CA Domain � A CA Domain �

Cross-certification

Users in CA domain A can use their certificates and key pairs with usin CA domain B because the CAs have cross-certified each other

Page 42: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography PKI

28

evocation list (CRL)1 into the

rmation on CRLs, see

rities in the PKI hierarchy.

device can accept X.509 port allows you to submit re PKI to validate all the

t view it once loaded.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. Supports loading the local certificate, the CA certificate, and the certificate runit.

You can also specify an interval for refreshing the CRL online. For more info“Certificates and CRLs” on page 29.

4. Provides certificate delivery when establishing an IPSec tunnel.

5. Supports certificate path validation upward through eight levels of CA autho

6. Supports the PKCS #7 cryptographic standard, which means the NetScreencertificates and CRLs packaged within a PKCS #7 envelope2. PKCS #7 supmultiple X.509 certificates within a single PKI request. You can now configusubmitted certificates from the issuing CA at one time.

7. Supports online CRL retrieval via LDAP or HTTP.

1. The Certificate Authority usually provides a CRL. Although you can load a CRL into the NetScreen device, you canno

2. NetScreen supports a PKCS #7 file size of up to 7 Kilobytes.

Page 43: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

29

of a trusted third party, known by an independent CA3, or by endent CA, you must contact ertificate revocation lists), and you are your own CA, you

N connection, you must first do

l certificate (also known as a

lly verifying the identity of the can perform this task manually,

ion, and you cannot anually and load that in the

voke a certificate. You might ertificate holder leaves a lly (which is a limited solution) ekly, or monthly intervals, or at

ivirus (AV) pattern file server out the AV pattern file server,

ject database server, see

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CERTIFICATES AND CRLSA digital certificate is an electronic means for verifying your identity through the wordas a Certificate Authority (CA). The CA server you use can be owned and operated your own organization, in which case you become your own CA. If you use an indepthem for the addresses of their CA and CRL servers (for obtaining certificates and cfor the information they require when submitting personal certificate requests. Whendetermine this information yourself.

To use a digital certificate to authenticate your identity when establishing a secure VPthe following:

• Generate a key in the NetScreen device, send it to a CA to obtain a personalocal certificate), and load the certificate in the NetScreen device.

• Obtain a CA certificate for the CA that issued the personal certificate (basicaCA verifying you), and load the CA certificate in the NetScreen device. You or automatically using Simple Certificate Enrollment Protocol (SCEP).

• If the certificate does not contain a certificate distribution point (CDP) extensautomatically retrieve the CRL via LDAP or HTTP, you can retrieve a CRL mNetScreen device.

During the course of business, there are several events that make it necessary to rewish to revoke a certificate if you suspect that it has been compromised or when a ccompany. Managing certificate revocations and validation can be accomplished locaor by referencing a CA’s CRL, which you can automatically access online at daily, wethe default interval set by the CA.

3. NetScreen supports the following CAs: Baltimore, Entrust, Microsoft, Netscape, RSA Keon, and Verisign.

Note: ScreenOS contains a CA certificate for authenticating downloads from the antand the Deep Inspection (DI) attack object database server. For more information absee �Antivirus Scanning� on page 4 -81. For more information about the DI attack ob�Attack Object Database Server� on page 4 -137.

Page 44: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

30

everal tasks in the following

device along with the CA

each tunnel connection

, a CRL to identify invalid

nd the CRL typically has the following section.

ht contain the CRL URL (either LDAP ly enter the default server settings for

icates, you must properly inistrator. You have to set your ss settings.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Obtaining a Certificate ManuallyTo obtain a signed digital certificate using the manual method, you must complete sorder:

1. Generate a public/private key pair.

2. Fill out the Certificate Request.

3. Submit your request to your CA of choice.

4. After you receive your signed certificate, you must load it into the NetScreencertificate.

You now have the following items for the following uses:

• A local certificate for the NetScreen device, to authenticate your identity with

• A CA Certificate (their public key), to be used to verify the peer’s certificate

• If the Certificate Revocation List (CRL) was included with the CA certificate4

certificates

When you receive these files (the certificate files typically have the extension .cer, aextension .crl), load them into your NetScreen using the procedure described in the

4. A CRL might accompany a CA certificate and be stored in the NetScreen database. Alternatively, the CA certificate migor HTTP) for a CRL that is stored in the CA’s database. If the CRL is unobtainable by either method, you can manualthe CRL URL in the NetScreen device, as explained in “Example: Configuring CRL Settings” on page 36.

Note: If you are planning to use e-mail to submit a PKCS10 file to obtain your certifconfigure your NetScreen settings so that you can send e-mail to your system admprimary and secondary DNS servers and specify the SMTP server and e-mail addre

Page 45: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

31

lic key becomes incorporated in rom the CA.

r Michael Zhang in the te is going to be used for a en device to send the request ator then copies and pastes the r the enrollment process is istrator.

em clock and assigned a host NSRP cluster, replace the host 8.)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Manual Certificate RequestWhen you request a certificate, the NetScreen device generates a key pair. The pubthe request itself and, eventually, in the digitally signed local certificate you receive f

In the following example, the security administrator is making a certificate request foDevelopment department at Juniper Networks in Sunnyvale, California. The certificaNetScreen device at IP address 10.10.5.44. The administrator instructs the NetScrevia e-mail to the security administrator at [email protected]. The security administrrequest in the certificate request text field at the CA’s certificate enrollment site. Aftecomplete, the CA usually sends the certificates via e-mail back to the security admin

WebUI

1. Certificate GenerationObjects > Certificates > New: Enter the following, and then click Generate :

Name: Michael Zhang

Phone: 408-730-6000

Unit/Department: Development

Organization: Juniper Networks

County/Locality: Sunnyvale

State: CA

Country: US

Note: Before generating a certificate request, make sure that you have set the systname and domain name to the NetScreen device. (If the NetScreen device is in an name with a cluster name. For more information, see �Cluster Name� on page 10 -1

Page 46: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

32

via e-mail, save the file to disk, ).

e to copy the entire text but not E REQUEST-----”, and end at

e CA’s Web site, pasting the

il, he forwards it to you. Copy it evice later through the WebUI)

ate request, you cannot use an e-mail alified domain name (if it is in the local

e. If you do not specify a local ID for e peer ID field.

ayer” on page 3 -7), be sure to use a

mail server-name { ip_addr |

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

E-mail: [email protected]

IP Address: 10.10.5.44

Write to file: (select)

RSA: (select)

Create new key pair of 10246 length: (select)

The NetScreen generates a PKCS #10 file and prompts you to send the fileor automatically enroll via the Simple Certificate Enrollment Protocol (SCEP

Select the E-mail to option, type [email protected], and then click OK7.

2. Certificate RequestThe security administrator opens the file, and copies its contents, taking carany blank spaces before or after the text. (Start at “-----BEGIN CERTIFICAT“-----END CERTIFICATE REQUEST-----”.)

The security administrator then follows the certificate request directions at thPKCS #10 file in the appropriate field when required.

3. Certificate RetrievalWhen the security administrator receives the certificate from the CA via e-mato a text file, and save it to your workstation (to be loaded to the NetScreen dor to a TFTP server (to be loaded later through the CLI).

5. Some CAs do not support an e-mail address in a certificate. If you do not include an e-mail address in the local certificaddress as the local IKE ID when configuring the NetScreen device as a dynamic peer. Instead, you can use a fully-qucertificate), or you can leave the local ID field empty. By default the NetScreen device sends its hostname.domainnama dynamic peer, enter the hostname.domainname of that peer on the device at the other end of the IPSec tunnel in th

6. The value 1024 indicates the bit length of the key pair. If you are using the certificate for SSL (see “Secure Sockets Lbit length that your Web browser also supports.

7. Using the e-mail address assumes that you have already configured the IP address for your SMTP server: set admindom_name }.

Page 47: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

33

e to copy the entire text but not E REQUEST-----”, and end at

e CA’s Web site, pasting the

il, he forwards it to you. Copy it evice later through the WebUI)

mail server-name { ip_addr |

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Certificate Generationset pki x509 dn country-name USset pki x509 dn email [email protected] pki x509 dn ip 10.10.5.44set pki x509 dn local-name “Santa Clara”set pki x509 dn name “Michael Zhang”set pki x509 dn org-name “Juniper Networks”set pki x509 dn org-unit-name Developmentset pki x509 phone 408-730-6000set pki x509 dn state-name CA

set pki x509 default send-to [email protected]

exec pki rsa new-key 1024

The certificate request is sent via e-mail to [email protected].

2. Certificate RequestThe security administrator opens the file, and copies its contents, taking carany blank spaces before or after the text. (Start at “-----BEGIN CERTIFICAT“-----END CERTIFICATE REQUEST-----”.)

The security administrator then follows the certificate request directions at thPKCS #10 file in the appropriate field when required.

3. Certificate RetrievalWhen the security administrator receives the certificate from the CA via e-mato a text file, and save it to your workstation (to be loaded to the NetScreen dor to a TFTP server (to be loaded later through the CLI).

8. Using the e-mail address assumes that you have already configured the IP address for your SMTP server: set admindom_name }.

Page 48: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

34

:

ts\ns on the administrator’s a TFTP server with IP address

te) and local.cer (your public

wse field.

owse field.

or later support loading multiple

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Loading Certificates and CRLsThe CA returns the following three files to you for loading onto the NetScreen device

• A CA certificate, which contains the CA’s public key

• A local certificate that identifies your local machine (your public key)

• A CRL, which lists any certificates revoked by the CA

For the WebUI example, you have downloaded the files to a directory named C:\cerworkstation. For the CLI example, you have downloaded the TFTP root directory on198.168.1.5.

This example illustrates how to load two certificate files named auth.cer (CA certificakey), and the CRL file named distrust.crl.

WebUI

1. Objects > Certificates: Select Load Cert , and then click Browse .

2. Navigate to the C:\certs directory, select auth.cer, and then click Open .

The directory path and file name (C:\certs\ns\auth.cer) appear in the File Bro

3. Click Load.

The auth.cer certificate file loads.

4. Objects > Certificates: Select Load Cert , and then click Browse .

5. Navigate to the C:\certs directory, select local.cer, and then click Open.

The directory path and file name (C:\certs\ns\local.cer) appear in the File Br

Note: NetScreen devices, including virtual systems, configured with ScreenOS 2.5 local certificates from different CAs.

Page 49: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

35

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. Click Load.

The auth.cer certificate file loads.

7. Objects > Certificates: Select Load CRL, and then click Browse .

8. Navigate to the C:\certs directory, select distrust.crl, and then click Open.

9. Click Load.

The distrust.crl CRL file loads.

CLI

exec pki x509 tftp 198.168.1.5 cert-name auth.cerexec pki x509 tftp 198.168.1.5 cert-name local.cerexec pki x509 tftp 198.168.1.5 crl-name distrust.crl

Page 50: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

36

during an IKE exchange are creen database, the NetScreen ithin the CA certificate itself. If e URL of the server that you ificate, the NetScreen device

nnecting to the LDAP server at settings to use the company’s

he following, and the click OK :

01,CN=PublicKeyServices,01,DC=com?CertificateRevocatoint

l signature when you load the r NetScreen device.

e IDX numbers for all the CA x509 list ca-cert.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Configuring CRL SettingsIn Phase 1 negotiations, participants check the CRL list to see if certificates receivedstill valid. If a CRL did not accompany a CA certificate and is not loaded in the NetSdevice tries to retrieve the CRL through the LDAP or HTTP9 CRL location defined wthere is no URL address defined in the CA certificate, the NetScreen device uses thdefine for that CA certificate. If you do not define a CRL URL for a particular CA certrefers to the CRL server at the default CRL URL address.

In this example, you first configure the Entrust CA server to check the CRL daily by co2.2.2.121 and locating the CRL file. You then configure default certificate validation LDAP server at 10.1.1.200, also checking the CRL on a daily basis.

WebUI

Objects > Certificates (Show: CA) > Server Settings (for NetScreen): Enter t

X509 Cert_Path Validation Level: Full

CRL Settings:

URL Address: ldap:///CN=Entrust,CN=en20CN=Services,CN=Configuration,DC=EN20ionList?base?objectclass=CRLDistributionP

LDAP Server: 2.2.2.121

Refresh Frequency: Daily

9. The CRL distribution point extension (.cdp) in an X509 certificate can be either an HTTP URL or an LDAP URL.

Note: With ScreenOS 2.5 and later, you can disable the checking of a CRL�s digitaCRL. However, disabling CRL certificate checking compromises the security of you

Note: The index (IDX) number for the Entrust CA certificate is 1. To view a list of thcertificates loaded on a NetScreen device, use the following CLI command: get pki

Page 51: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

37

, and then click OK :

afecert,CN=PublicKeyServices,CERT,DC=com?CertificateRevtionPoint

ust,CN=en2001,=EN2000,DC=com?Certificint”1

N=NetScreen,iguration,DC=SAFECERT,LDistributionPoint”.1.1.200

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Certificates > Default Cert Validation Settings: Enter the following

X509 Certificate Path Validation Level: Full

Certificate Revocation Settings:

Check Method: CRL

URL Address: ldap:///CN=NetScreen,CN=sCN=Services,CN=Configuration,DC=SAFEocationList?base?objectclass=CRLDistribu

LDAP Server: 10.1.1.200

CLI

set pki authority 1 cert-path fullset pki authority 1 cert-status crl url “ldap:///CN=Entr

CN=PublicKeyServices,CN=Services,CN=Configuration,DCateRevocationList?base?objectclass=CRLDistributionPo

set pki authority 1 cert-status crl server-name 2.2.2.12set pki authority 1 cert-status crl refresh dailyset pki authority default cert-path fullset pki authority default cert-status crl url “ldap:///C

CN=safecert,CN=PublicKeyServices,CN=Services,CN=ConfDC=com?CertificateRevocationList?base?objectclass=CR

set pki authority default cert-status crl server-name 10set pki authority default cert-status crl refresh dailysave

Page 52: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

38

N connection, you must first do

a personal certificate, and then

whose CA certificate you have e. You can perform this task EP).

to copy information from one , you can use the automatic

365).

reen device is in an NSRP �Cluster Name� on page

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Obtaining a Local Certificate AutomaticallyTo use a digital certificate to authenticate your identity when establishing a secure VPthe following:

• Obtain a certificate authority (CA) certificate from which you intend to obtainload the CA certificate in the NetScreen device.

• Obtain a local certificate (also known as a personal certificate) from the CA previously loaded, and then load the local certificate in the NetScreen devicmanually, or automatically using Simple Certificate Enrollment Protocol (SC

Because the manual method of requesting local certificates has steps requiring you certificate to another, it can be a somewhat lengthy process. To bypass these stepsmethod.

Note: Before using SCEP, you must perform the following tasks:� Configure and enable DNS (see �Domain Name System Support� on page 2 -� Set the system clock (see �System Clock� on page 2 -450).� Assign a host name and domain name to the NetScreen device. (If the NetSc

cluster, replace the host name with a cluster name. For more information, see10 -18.)

Page 53: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

39

the Simple Certificate

domain name, such as

the SCEP operation to request

ou refer to CA certificates by ee the IDX numbers for CA ys an IDX number and an ID CA certificate in commands.

ogram, and to receive data back. CGI the RA does not exist, use the value

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Automatic Certificate RequestIn this example, you use the automatic method to request a local certificate. You useEnrollment Protocol (SCEP) with the Verisign CA. You set the following CA settings:

• Full certificate path validation

• RA CGI: http://ipsec.verisign.com/cgi-bin/pkiclient.exe10

• CA CGI: http://ipsec.verisign.com/cgi-bin/pkiclient.exe

• Automatic integrity confirmation of CA certificates

• CA ID, which identifies a SCEP server, where Verisign SCEP server uses ajuniper.net or a domain set up by Verisign for your company

• Challenge password

• Automatic certificate polling every 30 minutes (the default is no polling)

You then generate an RSA key pair, specifying a key length of 1024 bits, and initiatea local certificate from the Verisign CA with the above CA settings.

When using the WebUI, you refer to CA certificates by name. When using the CLI, yindex (IDX) number. In this example, the IDX number for the Verisign CA is “1”. To scertificates, use the following command: get pki x509 list ca-cert. The output displanumber for each certificate. Note the IDX number and use that when referencing the

10. The Common Gateway Interface (CGI) is a standard way for a web server to pass a user request to an application pris part of the Hypertext Transfer Protocol (HTTP). You must specify an RA CGI path even if the RA does not exist. If specified for the CA CGI.

Page 54: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

40

following, and then click OK:

iclient.exe

iclient.exe

ttings, and then click Return to iguration page:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. CA Server SettingsObjects > Certificates > Show CA > Server Settings (for Verisign): Enter the

X509 certificate path validation level: Full

SCEP Settings:

RA CGI: http://ipsec.verisigncom/cgi-bin/pk

CA CGI: http://ipsec.verisigncom/cgi-bin/pk

> Advanced: Enter the following advanced sereturn to the basic CA Server Settings conf

Polling Interval: 30

Certificate Authentication: Auto

Certificate Renew: 14

2. Local Certificate RequestObjects > Certificates > New: Enter the following, and then click Generate :

Name: Michael Zhang

Phone: 408-730-6000

Unit/Department: Development

Organization: Juniper Networks

County/Locality: Sunnyvale

State: CA

Country: US

Email: [email protected]

IP Address: 10.10.5.44

Page 55: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

41

enerate a PKCS #10 file and

le Certificate Enrollment

ettings option, and then select

rize the certificate request

that your Web browser also supports.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Key Pair Information

RSA: (select)

Create new key pair of 102411 length.

Issue the get pki x509 pkcs CLI command to have the NetScreen device gthen, do one of the following:

– Send the PKCS #10 certificate request file to an e-mail address

– Save it to disk

– Automatically enroll by sending the file to a CA that supports the SimpProtocol (SCEP)

3. Automatic EnrollmentSelect the Automatically enroll to option, select the Existing CA server sVerisign from the drop-down list.

Contact Verisign to inform them of your certificate request. They must authobefore you can download the certificate.

11. The value 1024 indicates the bit length of the key pair. If you are using the certificate for SSL, be sure to use a bit length

Page 56: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

42

om/cgi-bin

om/cgi-bin

g a fingerprint value for the CA rtificate.rize the certificate request

ogram, and to receive data back. CGI

he CA CGI.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. CA Server Settingsset pki authority 1 cert-path fullset pki authority 1 scep ca-cgi “http://ipsec.verisign.c

/pkiclient.exe”12

set pki authority 1 scep ra-cgi “http://ipsec.verisign.c

/pkiclient.exe”13

set pki authority 1 scep polling-int 30set pki authority 1 scep renew-start 14

2. Local Certificate Requestset pki x509 dn country-name USset pki x509 dn email [email protected] pki x509 dn ip 10.10.5.44set pki x509 dn local-name “Santa Clara”set pki x509 dn name “Michael Zhang”set pki x509 dn org-name “Juniper Networks”set pki x509 dn org-unit-name Developmentset pki x509 phone 408-730-6000set pki x509 dn state-name CAexec pki rsa new 1024

3. Automatic Enrollmentexec pki x509 scep 1

If this is the first certificate request from this CA, a prompt appears presentincertificate. You must contact the CA to confirm that this is the correct CA ceContact Verisign to inform them of your certificate request. They must authobefore you can download the certificate.

12. The Common Gateway Interface (CGI) is a standard way for a web server to pass a user request to an application pris part of the Hypertext Transfer Protocol (HTTP).

13. You must specify an RA CGI path even if the RA does not exist. If the RA does not exist, use the value specified for t

Page 57: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Certificates and CRLs

43

through SCEP (Simple renew certificates on the ertificates at all times.

atically send out a request to een device to send out the . By setting different times for tes at the same time.

er, and the certificate must be eature to work, you must also

the subject name and

CEP certificates or on a

ated keys depends on the nough keys available to renew g a key usually goes unnoticed t the NetScreen device renews re-generated keys and have to ight affect the performance of

performance of the NetScreen

l. For more information, refer to

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Automatic Certificate RenewalYou can enable the NetScreen device to automatically renew certificates it acquiredCertificate Enrollment Protocol). This feature saves you from having to remember toNetScreen device before they expire, and by the same token, helps maintain valid c

This feature is disabled by default. You can configure the NetScreen device to automrenew a certificate before it expires. You can set the time when you want the NetScrcertificate renewal request in number of days and minutes before the expiration dateeach certificate, you prevent the NetScreen device from having to renew all certifica

For this feature to work, the NetScreen device must be able to reach the SCEP servpresent on the NetScreen device during the renewal process. Furthermore, for this fensure that the CA issuing the certificate can do the following:

• Support automatic approval of certificate requests.

• Return the same DN (Domain Name). In other words, the CA cannot modifySubjectAltName extension in the new certificate.

You can enable and disable the automatic SCEP certificate renewal feature for all Sper-certificate basis.

Key Pair GenerationA NetScreen device holds pre-generated keys in memory. The number of pre-generdevice model. During normal operation, the NetScreen device can manage to have ecertificates by generating a new key every time it uses one. The process of generatinas the device has time to generate a new key before one is needed. In the event thaa great number of certificates at once, thus using up keys rapidly, it might run out of pgenerate them promptly for each new request. In this case, the generation of keys mthe NetScreen device. Especially in a HA (High Availability) environment where the device might slow down for a number of minutes.

The number of pre-generated key pairs on a NetScreen device depends on the modethe specification sheet for your NetScreen product.

Page 58: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Status Check Using OCSP

44

mportant to verify the validity of ion. The default way to check icate Status Protocol (OCSP) is formation about certificates and

ster). This client sends a rts RSA Keon and Verisign as eck. Before the NetScreen tion of the OCSP responder.

for the certificate is available, responder contains the the response. Unless the r’s private key. The NetScreen esponder. The certificate of the ecified in the OCSP y the locally stored certificate:

d id_num2

_num2 identifies the locally

ocally, then the NetScreen question.

e past.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

STATUS CHECK USING OCSPWhen a NetScreen device performs an operation that uses a certificate, it is usually ithat certificate. Certificates might have become invalid through expiration or revocatthe status of certificates is to use certificate revocation lists (CRLs). The Online Certifan alternative way to check the status of certificates. OCSP can provide additional inprovide status checks in a more timely manner.

When a NetScreen device uses OCSP, it is referred to as the OCSP client (or requeverification request to a server device called the OCSP responder. ScreenOS suppoOCSP responders14. The client’s request contains the identity of the certificate to chdevice can perform any OCSP operation, you must configure it to recognize the loca

After receiving the request, the OCSP responder confirms that the status informationthen returns the current status to the NetScreen device. The response of the OCSPcertificate’s revocation status, the name of the responder, and the validity interval ofresponse is an error message, the responder signs the response using the respondedevice verifies the validity of the responder’s signature by using the certificate of the rresponder may either be embedded in the OCSP response, or stored locally and spconfiguration. If the certificate is stored locally, use the following command to specif

set pki authority id_num1 cert-status ocsp cert-verify i

id_num1 identifies the CA certificate that issued the certificate being verified, and idstored certificate the device uses to verify the signature on the OCSP response.

If the certificate of the responder is not embedded in the OCSP response or stored ldevice verifies the signature by using the CA certificate that issued the certificate in

14. Juniper Networks has also successfully tested with the Valicert OCSP responder during an extensive evaluation in th

Page 59: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Status Check Using OCSP

45

se commands use an te. You can obtain this ID

particular CA, use the following

RL | OCSP | none }

x:

te when you list the CA

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Configuring OCSPYou can use CLI commands to configure a NetScreen device for OCSP. Most of theidentification number to associate the revocation reference URL with the CA certificanumber using the following CLI command:

get pki x509 list ca-cert

Specifying CRL or OCSPTo specify the revocation check method (CRL, OCSP, or none) for a certificate of a CLI syntax:

set pki authority id_num cert-status revocation-check { C

where id_num is the identification number for the certificate.

The following example specifies OCSP revocation checking.

set pki authority 3 cert-status revocation-check ocsp

The ID number 3 identifies the certificate of the CA.

Viewing Status Check AttributesTo display the status check attributes for a particular CA, use the following CLI synta

get pki authority id_num cert-status

where id_num is the identification number for the certificate issued by the CA.

To display the status check attributes for the CA that issued certificate 7:

get pki authority 7 cert-status

Note: The NetScreen device dynamically assigns the ID number to the CA certificacertificates. This number might change after you modify the certificate store.

Page 60: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Status Check Using OCSP

46

following CLI syntax:

ith certificate at index 5, use the

10.10

8.2.1

ificate, use the following syntax:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Specifying an OCSP Responder URLTo specify the URL string of an OCSP responder for a particular certificate, use the

set pki authority id_num cert-status ocsp url url_str

To specify the URL string of an OCSP responder (http:\\192.168.10.10) for the CA wfollowing CLI syntax:

set pki authority 5 cert-status ocsp url http:\\192.168.

To remove the URL (http:\\192.168.2.1) of a CRL server for a certificate 5:

unset pki authority 5 cert-status ocsp url http:\\192.16

Removing Status Check AttributesTo remove all certificate status check attributes for a CA that issued a particular cert

unset pki authority id_num cert-status

To remove all revocation attributes related to certificate 1:

unset pki authority 1 cert-status

Page 61: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

47

y; that is, the issuer and the rtificate authorities (CAs) are

up—if there is no certificate t power it up. The NetScreen es it. The device never exports ncy Protocol (NSRP) cluster, it ates when synchronizing PKI

lly generated self-signed Manually Creating Self-Signed

ts subject name and fingerprint. fingerprint to verify the and fingerprint is an important nnection attempt and pretends

te. (For more information about

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

SELF-SIGNED CERTIFICATESA self-signed certificate is a certificate that is signed by and issued to the same entitsubject of the certificate are the same. For example, the CA certificates of all root ceself-signed.

A NetScreen device automatically generates a self-signed certificate when poweringalready configured for Secure Sockets Layer (SSL), which is the case when you firsdevice that creates an auto-generated self-signed certificate is the only device that usthis certificate outside itself. Even if the NetScreen device is in a NetScreen Redundadoes not include the auto-generated self-signed certificate with other types of certificobjects among other members in the cluster. (NSRP members do exchange manuacertificates. For information about manually generating self-signed certificates, see “Certificates” on page 51.)

Although you cannot export an auto-generated self-signed certificate, you can copy iYou can then deliver this to a remote admin who can later use the subject name andself-signed certificate received during SSL negotiations. Checking the subject nameprecaution against man-in-the-middle attacks in which someone intercepts an SSL coto be the targeted NetScreen device by responding with his own self-signed certificaverifying a self-signed certificate, see “Certificate Validation” on page 49.)

Page 62: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

48

nnection to the NetScreen cation and encryption to secure administrative connection

vailable for use with SSL e or you configure the ese other certificates for SSL. If ficate for SSL use, the e the device reboots16.

see �Secure Sockets Layer� on

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Securing Management Traffic with SSLYou can use a self-signed certificate when making a Secure Sockets Layer (SSL) codevice. When you manage the device through the WebUI, SSL can provide authentiyour administrative traffic. You can even configure a NetScreen device to redirect anattempt using HTTP (default port 80) to SSL (default port 443).

By default, the NetScreen device makes the auto-generated self-signed certificate anegotiations. It is the default SSL certificate. If you later install a CA-signed certificatNetScreen device to generate another self-signed certificate15, you can use one of thyou delete the auto-generated self-signed certificate and do not assign another certiNetScreen device automatically generates another self-signed certificate the next tim

Note: For more information on SSL, including the HTTP-to-SSL redirect mechanism,page 3 -7.

15. To learn how to create another self-signed certificate, see “Manually Creating Self-Signed Certificates” on page 51.

16. To learn how to delete an auto-generated self-signed certificate, see “Deleting Self-Signed Certificates” on page 59.

Page 63: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

49

ertificate to the SSL client. lidate it by checking the issuing self-signed certificate for use in ate it with a CA certificate in its

ch as the following, prompting

ystem clock might be ate. Even if you set the system an authenticating CA, so the n device uses a self-signed

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificate ValidationDuring an SSL handshake, the NetScreen device authenticates itself by sending a cWhen the NetScreen device sends a self-signed certificate, the SSL client cannot vaCA’s signature because no CA issued it. Still, when the NetScreen device presents aestablishing an SSL session, the Web browser on the admin’s computer tries to validCA store. When it fails to find such an authority, the browser displays a message suthe admin to accept or refuse the proffered certificate:

If this is the first time to connect to the NetScreen device after its initial bootup, the sinaccurate. Consequently, the validity period on the certificate might also be inaccurclock and then regenerate a self-signed certificate, the Web browser can never find admin must be prepared to see one of the above messages each time the NetScreecertificate for an SSL connection.

Two types of security alerts that can appear when a browser receives a self-signed certificate.

Page 64: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

50

logging in through SSL might which he is attempting to dle attack in an attempt to e receives by using the subject and fingerprint to the admin so ides it to authenticate itself.

use the following command17:

ed,

3a71435b>

g a secure out-of-band method rough SSL. When the admin’s ake, he can compare the ived out-of-band. If they match, authority to authenticate the annot know for sure if the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Without recourse to the certificate validation of an impartial third-party CA, the adminwonder if the received self-signed certificate is indeed from the NetScreen device toconnect. (After all, the certificate might be from an interloper using a man-in-the-midmasquerade as the NetScreen device.) The admin can validate the certificate that hname and fingerprint of the self-signed certificate. You can deliver the subject namethat he can validate the self-signed certificate when the NetScreen device later prov

To see the subject name and fingerprint of an auto-generated self-signed certificate,

ns-> get pki x509 cert system. . .

CN=0043022002000186,CN=system generated,CN=self-sign. . .finger print (md5) <e801eae4 56699fbc 324e38f2 4cfa5d47>finger print (sha) <0113f5ec 6bd6d32b 4ef6ead9 f809eead

After viewing the subject name and fingerprint, you can copy and deliver them (usinof your choice) to the admin that is later going to connect to the NetScreen device thSSL client receives the certificate from the NetScreen device during the SSL handshsubject name and fingerprint in the received certificate with those that he earlier recehe knows that the certificate is authentic. Because there is no trusted third-party CAcertificate, wIthout the subject name and fingerprint to compare, the remote admin ccertificate is genuine.

17. You cannot view the details of an auto-generated self-signed certificate through the WebUI.

Page 65: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

51

t power up the device so that it ifferent self-signed certificate ome possible reasons for d certificate:

. Your needs might require a self-signed key.

e that is automatically created.

evices that support virtual te with all the virtual systems. ates and then require their s instead of the attributes of a

s the distinguished name (DN) CN) elements always appear at

out-of-the-box support for otentially use this certificate as include the following:

raffic to a NetScreen device

Screen device

he device in which it is created, NetScreen device in an NSRP

rtificates only for use with SSL.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Manually Creating Self-Signed CertificatesThe NetScreen device automatically generates a self-signed certificate when you firscan support SSL for the initial connection. However, you might want to generate a dfrom the one that the NetScreen device automatically generates. The following are sreplacing the auto-generated self-signed certificate with an admin-defined self-signe

• The auto-generated self-signed certificate uses a fixed key size of 1024 bitslarger or smaller key size, which you can control when generating your own

• You might want to use a certificate with a different subject name from the on

• You might have a need for multiple self-signed certificates. On NetScreen dsystems, the root system can share the auto-generated self-signed certificaHowever, vsys admins might prefer to generate their own self-signed certificadmins to check the subject name and fingerprint of these specific certificateshared certificate.

Although you can configure various components of a self-signed certificate—such afields, the subject alternative name, and the key size—the following common name (the end of the DN:

“CN = dev_serial_num, CN = NetScreen self-signed”

Although the primary intended use of a self-signed certificate is to provide immediatemaking a Secure Sockets Layer (SSL) connection to a NetScreen device, you can pyou would any other CA-signed certificate. The uses for a self-signed certificate can

• Making a Secure Sockets Layer (SSL) connection to protect administrative t

• Securing traffic between the NetScreen-Security Manager (NSM) and a Net

• Authenticating IKE peers when establishing VPN tunnels

Note: Unlike an auto-generated self-signed certificate, which never passes outside ta manually generated self-signed certificate is included with other certificates when acluster synchronizes PKI objects with other members in the cluster.

Note: For the current ScreenOS release, NetScreen supports self-signed ce

Page 66: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

52

se with SSL:

ect name and fingerprint (also anage the NetScreen device.

ertificate. When he receives it, ificate with the information he

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Admin-Defined Self-Signed CertificateIn this example, you define the following components of a self-signed certificate for u

• Distinguished Name/Subject Name:

– Name: 4ssl

– Organization: jnpr

– FQDN: www.juniper.net

• Key type and length: RSA, 1024 bits

After defining it, you generate the certificate and view it. You can then copy the subjreferred to as a “thumbprint”) for distribution to other admins logging in via SSL to m

When an admin attempts to log in using SSL, the NetScreen device sends him this che can open the certificate and compare the subject name and fingerprint in the certreceived previously. If they match, he knows that the certificate is authentic.

WebUI

1. Define the Certificate AttributesObjects > Certificates > New: Enter the following, and then click Generate :

Certificate Subject Information:

Name: 4ssl

Organization: jnpr

FQDN: www.juniper.net

Key Pair Information:

RSA: (select)

Create new key pair of 1024 length.

Page 67: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

53

tificate request. Click Generate

just created.

icate it to other administrators itiate an SSL connection, they eed from the NetScreen device.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. Generate the Self-Signed CertificateAfter the NetScreen device completes the key generation it composes a cerSelf-Signed Cert .

3. View the Self-Signed CertificateObjects > Certificates > Show Local: Click Detail for the certificate that you

The following page appears, displaying details from the certificate:

You can copy the subject name and fingerprint from this page and communwho intend to use SSL when managing the NetScreen device. When they incan then use this information to ensure that the certificate they receive is ind

Page 68: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

54

s in its certificate request, enter

wing certificate request:

MDA0MzAyMjAwLmp1bmlwZXIuADCBiQKBgQDPEkZetA2ouKeAcC0admX0Da6TKwYJKoZIhvcNKoZIhvcNAQEFQ8HoyL5NE3+ilyPCBVvMiaHd

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Define the Certificate Attributesset pki x509 dn name 4sslset pki x509 dn org-name jnprset pki x509 cert-fqdn www.juniper.netsave

2. Generate the Self-Signed Certificate

To generate a public/private key pair, which the NetScreen devices usethe following command:

exec pki rsa new-key 1024

After the NetScreen device generates a key pair, it composes the follo

-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

Page 69: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

55

Name=======================,CN=0043022002000186,

=======================

eferencing the key pair ID

following command:

Name=======================

,CN=0043022002000186,

,CN=0043022002000186,

=======================

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To learn the ID number for the key pair, use the following command:

get pki x509 list key-pairGetting OTHER PKI OBJECT ...IDX ID num X509 Certificate Subject Distinguish====================================================0000 176095259 CN=4ssl,CN=www.juniper.net,CN=rsa-key

O=jnpr,====================================================

To generate the self-signed certificate, enter the following command, rnumber that you learned from the output of the previous command:

exec pki x509 self-signed-cert key-pair 176095259

3. View the Self-Signed Certificate

To view the self-signed certificate that you have just created, enter the

get pki x509 list local-certGetting LOCAL CERT ...IDX ID num X509 Certificate Subject Distinguish====================================================0000 176095261 LOCAL CERT friendly name <29>LOCAL CERT friendly name <29>CN=self-signed,CN=4ssl,CN=www.juniper.net,CN=rsa-key

O=jnpr,Expire on 10-19-2009 17:20, Issued By:CN=self-signed,CN=4ssl,CN=www.juniper.net,CN=rsa-key

O=jnpr,====================================================

Page 70: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

56

ng the ID number of the

,CN=0043022002000186,

,CN=0043022002000186,

98e>c1b 26e37e0e>9a3 5c8c6c27>

unicate it to other . When they initiate an SSL hey receive is indeed from the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To view the certificate in more detail, enter the following command usicertificate:

get pki x509 cert 176095261-0001 176095261 LOCAL CERT friendly name <29>CN=self-signed,CN=4ssl,CN=www.juniper.net,CN=rsa-key

O=jnpr,Expire on 10-19-2009 17:20, Issued By:CN=self-signed,CN=4ssl,CN=www.juniper.net,CN=rsa-key

O=jnpr,Serial Number: <9d1c03365a5caa172ace4f82bb5ec9da>subject alt name extension:email(1): (empty)fqdn(2): (www.juniper.net)ipaddr(7): (empty)no renewfinger print (md5) <be9e0280 02bdd9d1 175caf23 63451finger print (sha) <87e0eee0 c06f9bac 9098bd02 0e631subject name hash: <d82be8ae 4e71a576 2e3f06fc a9831use count: <1>flag <00000000>

You can copy the subject name and fingerprint from this output and commadministrators who intend to use SSL when managing the NetScreen deviceconnection, they can then use this information to ensure that the certificate tNetScreen device.

Page 71: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

57

ed certificate. The primary etScreen device. To see this

ed,

ed,

b5d>83c 817e26d9>7d4 a7834581>

ring the bootup process if the

red for SSL:

ted (“System”) self-signed

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificate Auto-GenerationThe first time the NetScreen device powers up, it automatically generates a self-signpurpose of this certificate is to support SSL immediately after the initial bootup of a Ncertificate, use the following CLI command18:

get pki x509 cert systemCN=0010062001000021,CN=system generated,CN=self-signExpire on 08- 3-2014 16:19, Issued By:CN=0010062001000021,CN=system generated,CN=self-signSerial Number: <c927f2044ee0cf8dc931cdb1fc363119>finger print (md5) <fd591375 83798574 88b3e698 62890finger print (sha) <40a1bda8 dcd628fe e9deaee1 92a27subject name hash: <0324d38d 52f814fe 647aba3a 86eda

By default, the NetScreen device automatically generates a self-signed certificate dufollowing conditions are met:

• No automatically generated self-signed certificate exists on the device.

• No certificate has been assigned for use with SSL.

You can use the following command to see if a certificate is already configu

get sslweb SSL enable.web SSL port number(443).web SSL cert: Default - System Self-Signed Cert.web SSL cipher(RC4_MD5).

In the above output, you can see that SSL is using the automatically generacertificate.

18. You can only view an automatically generated self-signed certificate through the CLI.

Page 72: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

58

tScreen device takes when

icate for use with SSL, and then tificate during the bootup o it and then reset the device, ring the next bootup process.

not automatically generate elf-signed certificate.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The following diagram shows the decision path for certificate generation that the Nebooting up:

If you delete the automatically generated self-signed certificate, assign another certifreset the device, the NetScreen device does not regenerate another self-signed cerprocess. If you next change the SSL configuration so that no certificate is assigned tthe NetScreen device does automatically regenerate a new self-signed certificate du

Auto-gen self-signed cert exists

Cert for SSL exists

Doa s

Bootup Process Starts

Yes

No

Yes

Decision Path for Certificate

Auto-Generation

Automatically generate a self-signed certificate.

No

Page 73: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

59

s you can with any type of instead of a self-signed use the following CLI

here id_num is the ID number

reen device to generate

set ssl cert).

tself to SSL (default port 443)21. , the NetScreen device always een assigned for SSL to use. If for SSL use, the NetScreen

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Deleting Self-Signed CertificatesYou can delete a self-signed certificate that is automatically or manually generated acertificate. Perhaps you obtain a CA-signed certificate that you prefer to use for SSLcertificate. For whatever reason, to delete the auto-generated self-signed certificate,command19:

delete pki object-id system

To delete an admin-configured self-signed certificate, use the following command, wof the certificate that you want to delete20:

delete pki object-id id_num

If you delete the auto-generated self-signed certificate and then later want the NetScanother one, do the following:

• Assign no other certificate for SSL (You can use the following command: un

• Reset the NetScreen device.

The NetScreen device can redirect HTTP traffic (default port 80) sent to the device iTherefore, to ensure that a certificate is available for SSL, during the bootup processchecks if an auto-generated self-signed certificate exists or if another certificate has bthere is no auto-generated self-signed certificate and no other certificate is assigneddevice automatically generates a self-signed certificate.

19. You can only delete an automatically generated self-signed certificate through the CLI.

20. To learn the ID number for a certificate, use the following command: get pki x509 list local-cert .

21. For information about the redirection of HTTP traffic to SSL, see “Redirecting HTTP to SSL” on page 3 -11.

Page 74: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 2 Public Key Cryptography Self-Signed Certificates

60

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 75: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

3

61

Chapter 3

el. Even when configuring a summarize all the choices for a for choosing one option or

d route-based VPN tunnels. We y IKE VPN tunnel to see the cludes with some useful VPN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPN Guidelines

NetScreen offers a variety of cryptographic options when you configure a VPN tunnsimple tunnel, you must make choices. The goal of the first half of this chapter is to basic site-to-site VPN and a basic dialup VPN, and to present one or more reasons another.

In the second half of the chapter, we explore the difference between policy-based anthen examine the packet flow for a route-based and policy-based site-to-site AutoKeoutbound and inbound processing stages that a packet undergoes. The chapter conconfiguration tips to keep in mind when configuring a tunnel.

The chapter is organized as follows:

• “Cryptographic Options” on page 62

– “Site-to-Site Cryptographic Options” on page 63

– “Dialup VPN Options” on page 72

• “Route- and Policy-Based Tunnels” on page 80

• “Packet Flow: Site-to-Site VPN” on page 82

• “Tunnel Configuration Tips” on page 89

Page 76: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

62

u want to use. Questions arise thm provides the best balance aphic options required to s one or more benefits about

unnel (between two NetScreen a NetScreen device). Although some cryptographic options.

unnel, you can refer to the that you must make while t appears in the tree.

PNs� and Chapter 5, �Dialup

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CRYPTOGRAPHIC OPTIONSWhen configuring a VPN, you must make many decisions about the cryptography yoabout which Diffie-Hellman group is the right one to choose, which encryption algoribetween security and performance, and so on. This section presents all the cryptogrconfigure a basic site-to-site VPN tunnel and a basic dialup VPN tunnel, and explaineach one to help you make your decisions.

The first decision that you must make is whether the tunnel is for a site-to-site VPN tdevices) or whether it is for a dialup VPN (from the NetScreen-Remote VPN client tothis is a networking decision, the distinction between the two types of tunnels affectsTherefore, the options are presented in two different decision trees:

• “Site-to-Site Cryptographic Options” on page 63

• “Dialup VPN Options” on page 72

After you decide whether you are going to configure a site-to-site tunnel or a dialup tappropriate decision tree for guidance. Each tree presents the cryptographic choicesconfiguring the tunnel. Following each tree are reasons for choosing each option tha

Note: Examples for configuring both kinds of tunnels are in Chapter 4, �Site-to-Site VVPNs�.

Page 77: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

63

graphic options in the decision

s. For background information

. . . . . . Manual Key?

13. IPSec Protocol:ESP . . . . . . . . or . . . . . . . . AH?

. Mode:or Transport?

ptions:/Auth or Auth?

ms:ES?

17. Auth Algorithms: MD5 or SHA-1?

up:

VPN Tunnel

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Site-to-Site Cryptographic OptionsWhen configuring a basic site-to-site VPN tunnel, you must choose among the cryptotree below. Advantages for each option follow.

Note: Options highlighted in purple indicate Juniper Networks-recommended optionabout the different IPSec options, see Chapter 1, �IPSec�.

1. Key Method:AutoKey IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . or . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

2. Mode: Aggressive or Main?

3. Authentication Type:Certificates or Preshared Key?

4. Certificate Type:RSA or DSA?

5. Bit Length: 512 or 768 or 1024 or 2048?

6. IKE Diffie-Hellman Group:1 or 2 or 5?

7. IKE Encrypt and Auth Algorithms:AES or DES or 3DES

and MD5 or SHA-1?

14Tunnel

15. ESP O Encrypt or Encrypt

16. Encrypt AlgorithAES or DES or 3D

10. Anti-Replay Checking:Yes or No?

11. Perfect Forward Secrecy:Yes or No?

12. IPSec Diffie-Hellman Gro1 or 2 or 5?

8. Local IKE ID:IP Address or

U-FQDN or FQDN or ASN1-DN?

Phase 2 �Phase 1 � IKE Gateway

9. Remote IKE ID:IP Address or

U-FQDN or FQDN or ASN1-DN?

Page 78: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

64

security

assigned and a preshared key

tes are used for authentication

lidate certificates with a Key Cryptography”.)

Key Infrastructure (PKI)

vantage of one certificate type

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

1. Key Method: Manual Key of AutoKey IKE?

AutoKey IKE

– Provides automatic key renewal and key freshness, thereby increasing

Manual Key

– Useful for debugging IKE problems

– Eliminates IKE negotiation delays when establishing a tunnel

2. Mode: Aggressive or Main?

Aggressive

– Required when the IP address of one of the IPSec peers is dynamicallyis used

Main

– Provides identity protection

– Can be used when the dialup user has a static IP address or if certifica

3. Authentication Type: Preshared Key or Certificates?

Certificates

– Greater security than provided by preshared keys because you can vacertificate authority (CA). (For more information, see Chapter 2, “Public

Preshared Key

– Easier to use and faster to set up because it does not require a Public

4. Certificate Type: RSA or DSA?

This depends on the CA from whom you get your certificates. There is no adover the other.

Page 79: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

65

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. Bit Length: 512 or 768 or 1024 or 2048?

512

– Incurs the least processing overhead

768

– Provides more security than 512 bits

– Incurs less processing overhead than 1024 and 2048 bits

1024

– Provides more security than 512 and 768 bits

– Incurs less processing overhead than 2048 bits

2048

– Provides the most security

6. IKE Diffie-Hellman Group: 1 or 2 or 5?

Diffie-Hellman Group 1

– Incurs less processing overhead than Diffie-Hellman Groups 2 and 5

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 2

– Incurs less processing overhead than Diffie-Hellman Group 5

– Provides more security than Diffie-Hellman Group 1

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 5

– Provides the most security

Page 80: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

66

-1?

qual

ndards (FIPS) and Common

ctAltName field

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

7. IKE Encrypt and Auth Algorithms: AES or DES or 3DES and MD5 or SHA

AES

– Cryptographically stronger than DES and 3DES if key lengths are all e

– Processing acceleration provided in NetScreen hardware

– Approved encryption algorithm for Federal Information Processing StaCriteria EAL4 standards

DES

– Incurs less processing overhead than 3DES and AES

– Useful when the remote peer does not support AES

3DES

– Provides more cryptographic security than DES

– Processing acceleration provided in NetScreen hardware

MD5

– Incurs less processing overhead than SHA-1

SHA-1

– Provides more cryptographic security than MD5

– The only authentication algorithm that FIPS accepts

8. Local IKE ID: IP Address (Default) or U-FQDN or FQDN or ASN1-DN?

IP Address

– Can only be used if the local NetScreen device has a static IP address

– Default IKE ID when using a preshared key for authentication

– Can be used with a a certificate if the IP address appears in the Subje

Page 81: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

67

n be used with a preshared key

key or a certificate if the FQDN

icates it issues

address when using preshared

ears in the SubjectAltName field

n be used with a preshared key

key or a certificate if the FQDN

for authentication and the peer

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

U-FQDN

– User-Fully Qualified Domain Name (U-FQDN—an e-mail address): Caor a certificate if the U-FQDN appears in the SubjectAltName field

FQDN

– Fully Qualified Domain Name (FQDN): Can be used with a preshared appears in the SubjectAltName field

– Useful for VPN gateways that have dynamic IP addresses

– Default IKE ID when using RSA or DSA certificates for authentication

ASN1-DN

– Can be used only with certificates

– Useful if the CA does not support the SubjectAltName field in the certif

9. Remote IKE ID: IP Address (Default) or U-FQDN or FQDN or ASN1-DN?IP Address

– Does not require you to enter a remote IKE ID for a peer at a static IP keys for authentication and the peer is a NetScreen device

– Can be used for a device with a static IP address

– Can be used with a preshared key or a certificate if the IP address app

U-FQDN

– User-Fully Qualified Domain Name (U-FQDN—an e-mail address): Caor a certificate if the U-FQDN appears in the SubjectAltName field

FQDN

– Fully Qualified Domain Name (FQDN): Can be used with a preshared appears in the SubjectAltName field

– Useful for VPN gateways that have dynamic IP addresses

– Does not require you to enter a remote IKE ID when using certificates is a NetScreen device

Page 82: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

68

icates it issues

o prevent Denial-of-Service ckets

the peers perform a second /decryption

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ASN1-DN

– Can be used only with certificates

– Useful if the CA does not support the SubjectAltName field in the certif

10. Anti-Replay Checking:

No or Yes?

Yes

– Enables the recipient to check sequence numbers in packet headers t(DoS) attacks caused when a malefactor resends intercepted IPSec pa

No

– Disabling this might resolve compatibility issues with third-party peers

11. Perfect Forward Secrecy: No of Yes?

Yes

– Perfect Forward Secrecy (PFS): Provides increased security because Diffie-Hellman exchange to produce the key used for IPSec encryption

No

– Provides faster tunnel setup

– Incurs less processing during Phase 2 IPSec negotiations

12. IPSec Diffie-Hellman Group: 1 or 2 or 5?

Diffie-Hellman Group 1

– Incurs less processing overhead than Diffie-Hellman Groups 2 and 5

– Processing acceleration provided in NetScreen hardware

Page 83: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

69

y through encryption and tion

cket, including the IPSec

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Diffie-Hellman Group 2

– Incurs less processing overhead than Diffie-Hellman Group 5

– Provides more security than Diffie-Hellman Group 1

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 5

– Provides the most security

13. IPSec Protocol:

ESP or AH?

ESP

– Encapsulating Security Payload (ESP): Can provide both confidentialitencapsulation of the original IP packet and integrity through authentica

– Can provide either encryption alone or authentication alone

AH

– Authentication Header (AH): Provides authentication of the entire IP paheader and outer IP header

14. Mode: Tunnel or Transport?

Tunnel

– Conceals the original IP header, thereby increasing privacy

Transport

– Required for L2TP-over-IPSec tunnel support

Page 84: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

70

using encrypt/auth

n

Perhaps when the information mes from the person who

ansit.

qual

andards

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

15. ESP Options: Encrypt or Encrypt/Auth or Auth?

Encrypt

– Provides faster performance and incurs less processing overhead than

– Useful when you require confidentiality but do not require authenticatio

Encrypt/Auth

– Useful when you want confidentiality and authentication

Auth

– Useful when you want authentication but do not require confidentiality.is not secret, but it is important to establish that the information truly coclaims to send it and that nobody tampered with the content while in tr

16. Encrypt Algorithms: AES or DES or 3DES?

AES

– Cryptographically stronger than DES and 3DES if key lengths are all e

– Processing acceleration provided in NetScreen hardware

– Approved encryption algorithm for FIPS and Common Criteria EAL4 st

DES

– Incurs less processing overhead than 3DES and AES

– Useful when the remote peer does not support AES

3DES

– Provides more cryptographic security than DES

– Processing acceleration provided in NetScreen hardware

Page 85: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

71

iguration between two ts:

FS) = yes

up 2

load (ESP)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

17. Auth Algorithms: MD5 or SHA-1?

MD5

– Incurs less processing overhead than SHA-1

SHA-1

– Provides more cryptographic security than MD5

Using the recommended options from the above list, a generic site-to-site VPN confNetScreen devices with static IP addresses would consist of the following componen

• AutoKey IKE • Perfect Forward Secrecy (P

• Main mode • Phase 2 Diffie-Hellman Gro

• 1024-bit certificates (RSA or DSA) • Encapsulating Security Pay

• Phase 1 Diffie-Hellman Group 2 • Tunnel mode

• Encryption = AES • Encryption/Authentication

• Authentication = SHA-1 • Encryption = AES

• IKE ID = IP address (default) • Authentication = SHA-1

• Anti-replay protection = yes

Page 86: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

72

hic options in the decision tree

s. For background information

12. IPSec Protocol:ESP . . . . . . . . or . . . . . . . . AH?

. Mode:or Transport?

ptions:/Auth or Auth?

ms:ES?

16. Auth Algorithms: MD5 or SHA-1?

up:

VPN Tunnel

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Dialup VPN OptionsWhen configuring a basic dialup VPN tunnel, you must choose among the cryptograpbelow. Advantages for each option follow.

Note: Options highlighted in purple indicate Juniper Networks-recommended optionabout the different IPSec options, see Chapter 1, �IPSec�.

Key Method = AutoKey IKE

1. Mode:Aggressive or Main?

2. Authentication Type:Certificates or Preshared Key?

3. Certificate Type:RSA or DSA?

4. Bit Length: 512 or 768 or 1024 or 2048?

5. IKE Diffie-Hellman Group:1 or 2 or 5?

6. IKE Encrypt and Auth Algorithms:AES or DES or 3DES

and MD5 or SHA-1?

13Tunnel

14. ESP O Encrypt or Encrypt

15. Encrypt AlgorithAES or DES or 3D

9. Anti-Replay Checking:Yes or No?

10. Perfect Forward Secrecy:Yes or No?

11. IPSec Diffie-Hellman Gro1 or 2 or 5?

7. Local IKE ID: IP Address (Default) or

U-FQDN or FQDN or ASN1-DN?

Phase 2 �Phase 1 � IKE Gateway

8. Remote IKE ID: IP Address (Default) or

U-FQDN or FQDN or ASN1-DN?

Page 87: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

73

assigned and a preshared key

n

lidate certificates with a Key Cryptography”.)

Key Infrastructure (PKI)

vantage of one certificate type

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

1. Mode: Aggressive or Main?

Aggressive

– Required when the IP address of one of the IPSec peers is dynamicallyis used

– Can be used with either certificates or preshared keys for authenticatio

Main

– Provides identity protection

2. Authentication Type: Preshared Key or Certificates?

Certificates

– Greater security than provided by preshared keys because you can vacertificate authority (CA). (For more information, see Chapter 2, “Public

Preshared Key

– Easier to use and faster to set up because it does not require a Public

3. Certificate Type: RSA or DSA?

This depends on the CA from whom you get your certificates. There is no adover the other.

4. Bit Length: 512 or 768 or 1024 or 2048?

512

– Incurs the least processing overhead

768

– Provides more security than 512 bits

– Incurs less processing overhead than 1024 and 2048 bits

Page 88: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

74

-1?

qual

andards

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

1024

– Provides more security than 512 and 768 bits

– Incurs less processing overhead than 2048 bits

2048

– Provides the most security

5. IKE Diffie-Hellman Group: 1 or 2 or 5?

Diffie-Hellman Group 1

– Incurs less processing overhead than Diffie-Hellman Groups 2 and 5

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 2

– Incurs less processing overhead than Diffie-Hellman Group 5

– Provides more security than Diffie-Hellman Group 1

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 5

– Provides the most security

6. IKE Encrypt and Auth Algorithms: AES or DES or 3DES and MD5 or SHA

AES

– Cryptographically stronger than DES and 3DES if key lengths are all e

– Processing acceleration provided in NetScreen hardware

– Approved encryption algorithm for FIPS and Common Criteria EAL4 st

DES

– Incurs less processing overhead than 3DES and AES

– Useful when the remote peer does not support AES

Page 89: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

75

dress

ears in the SubjectAltName field

n be used with a preshared key

key or a certificate if the FQDN

icates it issues

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3DES

– Provides more cryptographic security than DES

– Processing acceleration provided in NetScreen hardware

MD5

– Incurs less processing overhead than SHA-1

SHA-1

– Provides more cryptographic security than MD5

7. Local IKE ID: IP Address (Default) or U-FQDN or FQDN or ASN1-DN?

IP Address (Default)

– Does not require you to enter an IKE ID for a device with a static IP ad

– Can be used for a device with a static IP address

– Can be used with a preshared key or a certificate if the IP address app

U-FQDN

– User-Fully Qualified Domain Name (U-FQDN—an e-mail address): Caor a certificate if the U-FQDN appears in the SubjectAltName field

FQDN

– Fully Qualified Domain Name (FQDN): Can be used with a preshared appears in the SubjectAltName field

– Useful for VPN gateways that have dynamic IP addresses

ASN1-DN

– Can be used only with certificates

– Useful if the CA does not support the SubjectAltName field in the certif

Page 90: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

76

dress

ears in the SubjectAltName field

n be used with a preshared key

key or a certificate if the FQDN

icates it issues

o prevent Denial-of-Service ckets

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Remote IKE ID: IP Address (Default) or U-FQDN or FQDN or ASN1-DN?

IP Address (Default)

– Does not require you to enter an IKE ID for a device with a static IP ad

– Can be used for a device with a static IP address

– Can be used with a preshared key or a certificate if the IP address app

U-FQDN

– User-Fully Qualified Domain Name (U-FQDN—an e-mail address): Caor a certificate if the U-FQDN appears in the SubjectAltName field

FQDN

– Fully Qualified Domain Name (FQDN): Can be used with a preshared appears in the SubjectAltName field

– Useful for VPN gateways that have dynamic IP addresses

ASN1-DN

– Can be used only with certificates

– Useful if the CA does not support the SubjectAltName field in the certif

9. Anti-Replay Checking: No or Yes?

Yes

– Enables the recipient to check sequence numbers in packet headers t(DoS) attacks caused when a malefactor resends intercepted IPSec pa

No

– Disabling this might resolve compatibility issues with third-party peers

Page 91: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

77

the peers perform a second /decryption

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

10. Perfect Forward Secrecy: No of Yes?

Yes

– Perfect Forward Secrecy (PFS): Provides increased security because Diffie-Hellman exchange to produce the key used for IPSec encryption

No

– Provides faster tunnel setup

– Incurs less processing during Phase 2 IPSec negotiations

11. IPSec Diffie-Hellman Group: 1 or 2 or 5?

Diffie-Hellman Group 1

– Incurs less processing overhead than Diffie-Hellman Groups 2 and 5

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 2

– Incurs less processing overhead than Diffie-Hellman Group 5

– Provides more security than Diffie-Hellman Group 1

– Processing acceleration provided in NetScreen hardware

Diffie-Hellman Group 5

– Provides the most security

Page 92: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

78

y through encryption and tion

cket, including the IPSec

using encrypt/auth

n

Perhaps when the information mes from the person who

ansit.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

12. IPSec Protocol: ESP or AH?

ESP

– Encapsulating Security Payload (ESP): Can provide both confidentialitencapsulation of the original IP packet and integrity through authentica

– Can provide either encryption alone or authentication alone

AH

– Authentication Header (AH): Provides authentication of the entire IP paheader and outer IP header

13. Mode: Tunnel or Transport?

Tunnel

– Conceals the original IP header, thereby increasing privacy

Transport

– Required for L2TP-over-IPSec tunnel support

14. ESP Options: Encrypt or Encrypt/Auth or Auth?

Encrypt

– Provides faster performance and incurs less processing overhead than

– Useful when you require confidentiality but do not require authenticatio

Encrypt/Auth

– Useful when you want confidentiality and authentication

Auth

– Useful when you want authentication but do not require confidentiality.is not secret, but it is important to establish that the information truly coclaims to send it and that nobody tampered with the content while in tr

Page 93: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Cryptographic Options

79

qual

andards

tion between two NetScreen

FS) = yes

up 2

load (ESP)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

15. Encrypt Algorithms: AES or DES or 3DES?AES

– Cryptographically stronger than DES and 3DES if key lengths are all e– Processing acceleration provided in NetScreen hardware– Approved encryption algorithm for FIPS and Common Criteria EAL4 st

DES

– Incurs less processing overhead than 3DES and AES– Useful when the remote peer does not support AES

3DES

– Provides more cryptographic security than DES– Processing acceleration provided in NetScreen hardware

16. Auth Algorithms: MD5 or SHA-1?

MD5

– Incurs less processing overhead than SHA-1

SHA-1

– Provides more cryptographic security than MD5

Using the recommended options from the above list, a generic dialup VPN configuradevices with static IP addresses would consist of the following components:

• Aggressive mode • Perfect Forward Secrecy (P

• 1024-bit certificates (RSA or DSA) • Phase 2 Diffie-Hellman Gro

• Phase 1 Diffie-Hellman Group 2 • Encapsulating Security Pay

• Encryption = AES • Tunnel mode

• Authentication = SHA-1 • Encryption/Authentication

• IKE ID = U-FQDN (e-mail address) • Encryption = AES

• Anti-replay protection = yes • Authentication = SHA-1

Page 94: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Route- and Policy-Based Tunnels

80

can create route-based and AutoKey IKE to manage the

that together with source, y, the VPN policy action is tion, a policy specifically

tead, the policy references a rface through which it must

nd to a specific VPN tunnel1.

e construction of a policy. With , and the policy as a method for

er of policies that the device umber of route entries or the

tunnel resources while setting rencing the same VPN tunnel, er, each of which counts as an is not coupled to the means of single VPN tunnel between two allows you to create policies unlike a policy-based VPN it.

ore information, see “Multiple Tunnels

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ROUTE- AND POLICY-BASED TUNNELSThe configuration of a NetScreen device for VPN support is particularly flexible. Youpolicy-based VPN tunnels. Additionally, each type of tunnel can use Manual Key or keys used for encryption and authentication.

With policy-based VPN tunnels, a tunnel is treated as an object (or a building block)destination, service, and action, comprises a policy that permits VPN traffic. (Actualltunnel , but the action permit is implied, if unstated). In a policy-based VPN configurareferences a VPN tunnel by name.

With route-based VPNs, the policy does not specifically reference a VPN tunnel. Insdestination address. When the NetScreen device does a route lookup to find the intesend traffic to reach that address, it finds a route via a tunnel interface, which is bou

Thus, with a policy-based VPN tunnel, you can consider a tunnel as an element in tha route-based VPN tunnel, you can consider a tunnel as a means for delivering trafficeither permitting or denying the delivery of that traffic.

The number of policy-based VPN tunnels that you can create is limited by the numbsupports. The number of route-based VPN tunnels that you create is limited by the nnumber of tunnel interfaces that the device supports—whichever number is lower.

A route-based VPN tunnel configuration is a good choice when you want to conservegranular restrictions on VPN traffic. Although you can create numerous policies refeeach policy creates an individual IPSec security association (SA) with the remote peindividual VPN tunnel. With a route-based approach to VPNs, the regulation of trafficits delivery. You can configure dozens of policies to regulate traffic flowing through a sites, and there is just one IPSec SA at work. Also, a route-based VPN configurationreferencing a destination reached through a VPN tunnel in which the action is deny ,configuration, in which—as stated earlier—the action must be tunnel , implying perm

1. Typically, a tunnel interface is bound to a single tunnel. You can also bind a tunnel interface to multiple tunnels. For mper Tunnel Interface” on page 365.

Page 95: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Route- and Policy-Based Tunnels

81

information through VPN ateway Protocol (BGP), on a

routing information through the

nd you do not need to conserve nnel makes sense. Also, can be a good choice for dialup

etScreen-Remote does—there ed dialup VPN tunnel offers the

enforcement.

d VPN configuration.

oke configuration (see

lient by configuring the remote

face.

xample: Route-Based Dialup

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Another advantage that route-based VPNs offer is the exchange of dynamic routingtunnels. You can enable an instance of a dynamic routing protocol, such as Border Gtunnel interface that is bound to a VPN tunnel. The local routing instance exchangestunnel with a neighbor enabled on a tunnel interface bound to the other end.

When a tunnel does not connect large networks running dynamic routing protocols atunnels or define various policies to filter traffic through the tunnel, a policy-based tubecause there is no network beyond a dialup VPN client, policy-based VPN tunnels VPN configurations.

That said, when the dialup client supports a virtual internal IP address—which the Nare also compelling reasons for using a route-based VPN configuration. A route-basfollowing benefits:

• You can bind its tunnel interface to any zone to require or not require policy

• You can define routes to force traffic through the tunnel, unlike a policy-base

• A route-based VPN tunnel simplifies the addition of a spoke to a hub-and-sp“Hub-and-Spoke VPNs” on page 459).

• You can adjust the proxy ID to accept any IP address from the dialup VPN cclient's address as 255.255.255.255/32.

• You can define one or more mapped IP (MIP) addresses on the tunnel inter

Note: For an example of a route-based VPN configuration for a dialup client, see �EVPN, Dynamic Peer� on page 232.

Page 96: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

82

ec tunnel work in relation to oth when a NetScreen device g for a route-based VPN is a policy-based VPN.

nnect the two sites through an HA-1 for authentication using a ting each site are in NAT mode,

.5/32 in the Paris LAN through

ethernet110.2.2.1/24

Trust Zone

ParisLAN

ParisOffice

10.2.2.5

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

PACKET FLOW: SITE-TO-SITE VPNTo better understand how the various components comprising the creation of an IPSeach other, this section looks at the processing of a packet flow through a tunnel—bsends outbound VPN traffic and when it receives inbound VPN traffic. The processinpresented, followed by an addendum noting the two places in the flow that differ for

A company based in Tokyo has just opened a branch office in Paris and needs to coIPSec tunnel. The tunnel uses AutoKey IKE, the ESP protocol, AES for encryption, Spreshared key, and has anti-replay checking enabled. The NetScreen devices protecand all the zones are in the trust-vr routing domain. The addresses are as follows:

The path of a packet coming from 10.1.1.5/32 in the Tokyo LAN and going to 10.2.2an IPSec tunnel proceeds as described in the following subsections.

TokyoOffice

Outgoing Interface: ethernet3, 1.1.1.1/24

Internet

Trust Zone

vpn1

Untrust Zone

Untrust Zone

TokyoLAN

ethernet110.1.1.1/24

tunnel.2, 10.2.1.1/24Outgoing Interface: ethernet3, 2.2.2.2/24

External router: 2.2.2.250

External router: 1.1.1.250

tunnel.1, 10.1.2.1/24

10.1.1.5

Page 97: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

83

is the IP address ethernet1 and

st zone, the NetScreen device one of the following three

nfigured to block the packet, nt log.

nfigured to record the event but REEN counters list for

reen device proceeds to the

reen device immediately

cket with an existing session.

rms First Packet Processing, a

ast Processing, using the Fast Processing bypasses the d steps has already been

es the destination IP address n device proceeds to the next tion address translation

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Tokyo (Initiator)

1. The host at 10.1.1.5 sends a packet destined for 10.2.2.5 to 10.1.1.1, which is the default gateway configured in the TCP/IP settings of host.

2. The packet arrives at ethernet1, which is bound to the Trust zone.

3. If you have enabled SCREEN options such as IP spoof detection for the Truactivates the SCREEN module at this point. SCREEN checking can produceresults:

– If a SCREEN mechanism detects anomalous behavior for which it is cothe NetScreen device drops the packet and makes an entry in the eve

– If a SCREEN mechanism detects anomalous behavior for which it is conot block the packet, the NetScreen device records the event in the SCethernet1 and proceeds to the next step.

– If the SCREEN mechanisms detect no anomalous behavior, the NetScnext step.

If you have not enabled any SCREEN options for the Trust zone, the NetScproceeds to the next step.

4. The session module performs a session lookup, attempting to match the pa

If the packet does not match an existing session, the NetScreen device perfoprocedure involving the remaining steps.

If the packet matches an existing session, the NetScreen device performs Finformation available from the existing session entry to process the packet. route and policy lookups because the information generated by the bypasseobtained during the processing of the first packet in the session.

5. The address-mapping module checks if a mapped IP (MIP) configuration us10.2.2.5. Because 10.2.2.5 is not used in a MIP configuration, the NetScreestep. (For information about packet processing when MIPs, VIPs, or destina[NAT-dst] is involved, see “Packet Flow for NAT-Dst” on page 7 -36.)

Page 98: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

84

r 10.2.2.5. (The route module te lookup.) It finds a route entry nel named “vpn1”. The tunnel ces, the NetScreen device has

icy lookup.

s (as determined by the licy matching the source

sts with the remote peer. The

roceeds to step 10.

peer, it drops the packet and

. The Phase 1 SA check can

this SA to negotiate a Phase 2

er, it begins Phase 1

packet. Using the address in the outer header. Using the ddress in the outer header. riginal IP header. Then, it

ed for 2.2.2.2 through the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. To determine the destination zone, the route module does a route lookup fouses the ingress interface to determine which virtual router to use for the roudirecting traffic to 10.2.2.5 through the tunnel.1 interface bound to a VPN tuninterface is in the Untrust zone. By determining the ingress and egress interfathereby determined the source and destination zones and can now do a pol

7. The policy engine does a policy lookup between the Trust and Untrust zonecorresponding ingress and egress interfaces). The action specified in the poaddress and zone, destination address and zone, and service is permit.

8. The IPSec module checks if an active Phase 2 security association (SA) exiPhase 2 SA check can produce either of the following results:

– If the IPSec module discovers an active Phase 2 SA with that peer, it p

– If the IPSec module does not discover an active Phase 2 SA with that triggers the IKE module.

9. The IKE module checks if an active Phase 1 SA exists with the remote peerproduce either of the following results:

– If the IKE module discovers an active Phase 1 SA with the peer, it usesSA.

– If the IKE module does not discover an active Phase 1 SA with that penegotiations in Main mode, and then Phase 2 negotiations.

10. The IPSec module puts an ESP header and then an outer IP header on the specified as the outgoing interface, it puts 1.1.1.1 as the source IP address address specified for remote gateway, it puts 2.2.2.2 as the destination IP aNext, it encrypts the packet from the payload to the next header field in the oauthenticates the packet from the ESP trailer to the ESP header.

11. The NetScreen device sends the encrypted and authenticated packet destinoutgoing interface (ethernet3) to the external router at 1.1.1.250.

Page 99: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

85

ace bound to the Untrust zone.

uter packet header, the IPSec g with the keys to authenticate wing three results:

roceeds to step 4.

eer but it can match an inactive acket, makes an event log g peer.

peer, it drops the packet and

. The Phase 1 SA check can

this SA to negotiate a Phase 2

er, it begins Phase 1

ne of two results:

number that the NetScreen

eds to the next step.

heck can produce one of two

s the packet.

roceeds to the next step.

overing its original source cket came through vpn1, which e packet as if its ingress g window at this point.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Paris (Recipient)1. The packet arrives at 2.2.2.2, which is the IP address of ethernet3, an interf

2. Using the SPI, destination IP address, and IPSec protocol contained in the omodule attempts to locate an active Phase 2 SA with the initiating peer alonand decrypt the packet. The Phase 2 SA check can produce one of the follo

– If the IPSec module discovers an active Phase 2 SA with the peer, it p

– If the IPSec module does not discover an active Phase 2 SA with the pPhase 2 SA using the source IP address but not the SPI, it drops the pentry, and sends a notification that it received a bad SPI to the initiatin

– If the IPSec module does not discover an active Phase 2 SA with that triggers the IKE module.

3. The IKE module checks if an active Phase 1 SA exists with the remote peerproduce either of the following results:

– If the IKE module discovers an active Phase 1 SA with the peer, it usesSA.

– If the IKE module does not discover an active Phase 1 SA with that penegotiations in Main mode, and then Phase 2 negotiations.

4. The IPSec module performs an anti-replay check. This check can produce o

– If the packet fails the anti-replay check, because it detects a sequencedevice has already received, the NetScreen device drops the packet.

– If the packet passes the anti-replay check, the NetScreen device proce

5. The IPSec module attempts to authenticate the packet. The authentication cresults:

– If the packet fails the authentication check, the NetScreen device drop

– If the packet passes the authentication check, the NetScreen device p

6. Using the Phase 2 SA and keys, the IPSec module decrypts the packet, uncaddress (10.1.1.5) and its ultimate destination (10.2.2.5). It learns that the pais bound to tunnel.1. From this point forward, the NetScreen device treats thinterface is tunnel.1 instead of ethernet3. It also adjusts the anti-replay slidin

Page 100: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

86

evice activates the SCREEN ree results:

nfigured to block the packet, nt log.

nfigured to record the event but REEN counters list for

reen device proceeds to the

cket with an existing session. It

ast Processing, using the Fast Processing bypasses all information generated by the packet in the session.

) configuration uses the IP configuration, the NetScreen

ter to use for the route lookup; ust-vr and discovers that it is and the egress interface stination zones. The tunnel.1 ne. The NetScreen device can

e and finds a policy that grants

on at 10.2.2.5.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

7. If you have enabled SCREEN options for the Untrust zone, the NetScreen dmodule at this point. SCREEN checking can produce one of the following th

– If a SCREEN mechanism detects anomalous behavior for which it is cothe NetScreen device drops the packet and makes an entry in the eve

– If a SCREEN mechanism detects anomalous behavior for which it is conot block the packet, the NetScreen device records the event in the SCethernet3 and proceeds to the next step.

– If the SCREEN mechanisms detect no anomalous behavior, the NetScnext step.

8. The session module performs a session lookup, attempting to match the pathen either performs First Packet Processing or Fast Processing.

If the packet matches an existing session, the NetScreen device performs Finformation available from the existing session entry to process the packet. but the last two steps (encrypting the packet and forwarding it) because the bypassed steps has already been obtained during the processing of the first

9. The address-mapping module checks if a mapped IP (MIP) or virtual IP (VIPdestination IP address 10.2.2.5. Because 10.2.2.5 is not used in a MIP or Vdevice proceeds to the next step.

10. The route module first uses the ingress interface to determine the virtual rouin this case, the trust-vr. It then performs a route lookup for 10.2.2.5 in the traccessed through ethernet1. By determining the ingress interface (tunnel.1)(ethernet1), the NetScreen device can thereby determine the source and deinterface is bound to the Untrust zone, and ethernet1 is bound to the Trust zonow do a policy lookup.

11. The policy engine checks its policy list from the Untrust zone to the Trust zonaccess.

12. The NetScreen device forwards the packet through ethernet1 to its destinati

Page 101: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

87

ed VPN configuration at two

ed and policy-based VPN

oes a route lookup for 10.2.2.5. it to a route through ethernet3, ress interfaces, the NetScreen can now perform a policy

rust and Untrust zones. The zone, and service and finds a

tination at 10.2.2.5.

for both route-based and nel interface, but to a tunnel ch is bound to the Untrust-Tun Ns, the NetScreen device t tunnel.1.

e and policy lookups differ:

and discovers that it is ing that the Untrust zone is the

hose carrier zone is the Untrust terface (ethernet1 is bound to

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Addendum: Policy-Based VPN

The packet flow for a policy-based VPN configuration differs from that of a route-baspoints: the route lookup and the policy lookup.

Tokyo (Initiator)

The first stages of the outbound packet flow are the same for both route-basconfigurations until the route lookup and subsequent policy lookup occur:

Route Lookup: To determine the destination zone, the route module dNot finding an entry for that specific address, the route module resolveswhich is bound to the Untrust zone. By determining the ingress and egdevice has thereby determined the source and destination zones, andlookup.

Policy Lookup: The policy engine does a policy lookup between the Tlookup matches the source address and zone, destination address andpolicy that references a VPN tunnel named vpn1.

The NetScreen device then forwards the packet through ethernet1 to its des

Paris (Recipient)

Most stages of the inbound packet flow on the recipient’s end are the same policy-based VPN configurations except that the tunnel is not bound to a tunzone. The NetScreen device learns that the packet came through vpn1, whitunnel zone, whose carrier zone is the Untrust zone. Unlike route-based VPconsiders ethernet3 to be the ingress interface of the decrypted packet—no

The flow changes after packet decryption is complete. At this point, the rout

Route Lookup: The route module performs a route lookup for 10.2.2.5accessed through ethernet1, which is bound to the Trust zone. By learnsource zone (because vpn1 is bound to the Untrust-Tun tunnel zone, wzone) and by determining the destination zone based on the egress in

Page 102: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Packet Flow: Site-to-Site VPN

88

the Untrust to the Trust zones

st zone to the Trust zone and s access to 10.2.2.5.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

the Trust zone), the NetScreen device can now check for a policy fromthat references vpn1.

Policy Lookup: The policy engine checks its policy list from the Untrufinds a policy that references a VPN tunnel named vpn1 and that grant

The NetScreen device then forwards the packet to its destination.

Page 103: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Tunnel Configuration Tips

89

unnels. When configuring an

four proposals for Phase 2 osal and one Phase 2 proposal negotiations, see “Tunnel

local certificate loaded on the nnel configuration to use. For y” on page 23.

“Any”.

s of the VPN must match.

ified in the proxy ID for both e as the remote IP address

.

ult—derives the proxy ID from olicy that references that VPN ed VPN that supersedes the

he local address, 0.0.0.0/0 for for access control, you use figurations with 4, “Site-to-Site VPNs”.

e IP address /netmask in the proxy ID.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

TUNNEL CONFIGURATION TIPSThis section offers some guidelines, or tips, to keep in mind when configuring VPN tIPSec VPN tunnel, keep the following points in mind:

• NetScreen supports up to four proposals for Phase 1 negotiations and up tonegotiations. A peer must be configured to accept at least one Phase 1 propproffered by the other peer. For information about Phase 1 and Phase 2 IKENegotiation” on page 11.

• If you want to use certificates for authentication and there is more than one NetScreen device, you must specify which certificate you want each VPN tumore information about certificates, see Chapter 2, “Public Key Cryptograph

• For a basic policy-based VPN:

– Use user-defined addresses in the policy, not the pre-defined address

– The addresses and service specified in policies configured at both end

– Use symmetric policies for bidirectional VPN traffic.

• The proxy ID for both peers must match, which means that the service specpeers is the same, and the local IP address specified for one peer is the samspecified for the other peer2.

– For a route-based VPN configuration, the proxy ID is user configurable

– For a policy-based VPN configuration, the NetScreen device—by defathe source address, destination address, and service specified in the ptunnel in the policy list. You can also define a proxy ID for a policy-basderived proxy ID.

The simplest way to ensure that the proxy IDs match is to use 0.0.0.0/0 for tthe remote address3, and “any” for the service. Instead of using the proxy IDpolicies to control the traffic to and from the VPN. For examples of VPN conuser-configurable proxy IDs, see the route-based VPN examples in Chapter

2. The proxy ID is a three-part tuple consisting of local IP address–remote IP address–service.

3. When the remote address is the virtual internal address of a dialup VPN client, use 255.255.255.255/32 for the remot

Page 104: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 3 VPN Guidelines Tunnel Configuration Tips

90

defines a route-based VPN and nfiguration and peer-2 uses a ches the proxy ID derived from -src) using a DIP pool, use the xy ID. For example:

t, see “VPN Sites with

in a proxy ID derived from a

E ID, which is their IP ss, that peer or user must use U-FQDN (e-mail address) is a types with preshared keys and the certificate). If you use SN1-DN as the IKE ID.

ID that the NetScreen device derives

ID:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

• As long as the peers' proxy ID settings match, it does not matter if one peer the other defines a policy-based VPN. If peer-1 uses a policy-based VPN coroute-based VPN configuration, then peer-2 must define a proxy ID that matpeer-1’s policy4. If peer-1 performs source network address translation (NATaddress and netmask for the DIP pool as the remote address in peer-2’s pro

For more information about proxy IDs when used with NAT-src and NAT-dsOverlapping Addresses” on page 190.

• Because proxy IDs support either a single service or all services, the servicepolicy-based VPN referencing a service group is considered as “any”.

• When both peers have static IP addresses, they can each use the default IKaddresses. When a peer or dialup user has a dynamically assigned IP addreanother type of IKE ID. An FQDN is a good choice for a dynamic peer and agood choice for a dialup user. You can use both FQDN and U-FQDN IKE IDcertificates (if the FQDN or U-FQDN appears in the SubjectAltName field in certificates, the dynamic peer or dialup user can also use all or part of the A

4. Peer-1 can also define a proxy ID that matches peer-2’s proxy ID. Peer-1’s user-defined proxy ID supersedes the proxyfrom the policy components.

When the DIP pool is: Use this in the proxy 1.1.1.8 � 1.1.1.8 1.1.1.8/32

1.1.1.20 � 1.1.1.50 1.1.1.20/26

1.1.1.100 � 1.1.1.200 1.1.1.100/25

1.1.1.0 � 1.1.1.255 1.1.1.0/24

Page 105: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

4

91

Chapter 4

nnel between two NetScreen us elements that you must

e 209

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Site-to-Site VPNs

This chapter explains how to configure a site-to-site virtual private network (VPN) tudevices. It examines route-based and policy-based VPN tunnels, presents the varioconsider when setting up a tunnel, and offers several examples.

• “Site-to-Site VPN Configurations” on page 92

– “Site-to-Site Tunnel Configuration Steps” on page 93

– “Example: Route-Based Site-to-Site VPN, AutoKey IKE” on page 99

– “Example: Policy-Based Site-to-Site VPN, AutoKey IKE” on page 113

– “Example: Route-Based Site-to-Site VPN, Dynamic Peer” on page 124

– “Example: Policy-Based Site-to-Site VPN, Dynamic Peer” on page 139

– “Example: Route-Based Site-to-Site VPN, Manual Key” on page 153

– “Example: Policy-Based Site-to-Site VPN, Manual Key” on page 164

• “Dynamic IKE Gateways Using FQDN” on page 173

– “Example: AutoKey IKE Peer with FQDN” on page 175

• “VPN Sites with Overlapping Addresses” on page 190

– “Example: Tunnel Interface with NAT-Src and NAT-Dst” on page 193

• “Transparent Mode VPN” on page 208

– “Example: Transparent Mode, Policy-Based AutoKey IKE VPN” on pag

Page 106: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

92

address. When both gateways

ddress, you can configure the

r certificates)

, each with a NetScreen device utgoing interface on both . If the NetScreen device is in erface. With a static site-to-site IP address of the remote

d IP address, that device is ite-to-site VPN, only hosts e gateway has a fixed IP stablished between a dynamic tination hosts have fixed IP

�IPSec�. For guidance when

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

SITE-TO-SITE VPN CONFIGURATIONSAn IPSec VPN tunnel exists between two gateways, and each gateway needs an IPhave static IP addresses, you can configure the following kinds of tunnels:

• Site-to-Site VPN, AutoKey IKE tunnel (with a preshared key or certificates)

• Site-to-Site VPN, Manual Key tunnel

When one gateway has a static address and the other has a dynamically assigned afollowing kind of tunnel:

• Dynamic Peer Site-to-Site VPN, AutoKey IKE tunnel (with a preshared key o

As used here, a static site-to-site VPN involves an IPSec tunnel connecting two sitesoperating as a secure gateway. The physical interface or subinterface used as the odevices has a fixed IP address, and the internal hosts also have static IP addressesTransparent mode, it uses the VLAN1 address as the IP address for the outgoing intVPN, hosts at either end of the tunnel can initiate the VPN tunnel setup because thegateway remains constant and thus reachable.

If the outgoing interface of one of the NetScreen devices has a dynamically assignetermed a dynamic peer and the VPN is configured differently. With a dynamic peer sbehind the dynamic peer can initiate the VPN tunnel setup because only their remotaddress and is thus reachable from their local gateway. However, after a tunnel is epeer and a static peer, hosts behind either gateway can initiate VPN traffic if the desaddresses.

Note: For background information about the available VPN options, see Chapter 1, choosing among the various options, see Chapter 3, �VPN Guidelines�.

Page 107: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

93

configuration with that of other urations in this section are set ffice in Paris through an IPSec

Eth110.2.2.1/24

NAT

LAN10.2.2.0/24

Trust Zone

n

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Site-to-Site Tunnel Configuration StepsThe configuration of a site-to-site VPN tunnel requires the coordination of the tunnelsettings—interfaces, addresses, routes, and policies. The three example VPN configin the following context: an office in Tokyo wants to communicate securely with an oVPN tunnel.

The administrators in both offices configure the following settings:

• Interfaces – Security Zones and Tunnel

• Addresses

• VPN (one of the following)

– AutoKey IKE

– Dynamic Peer

– Manual Key

• Routes

• Policies

Eth3, 2.2.2.2/24

LAN10.1.1.0/24

Internet

Tunnel: vpn1

tunnel.1, Unnumbered

external router, 2.2.2.250

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

TokyoNetScreen

ParisNetScree

Eth110.1.1.1/24

NATEth3, 1.1.1.1/24

tunnel.1, Unnumbered

external router, 1.1.1.250

Page 108: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

94

aces with the settings that ewise with the settings that

e gateway for VPN traffic sent

internal hosts, yet when traffic lates the source IP address in 1.1.1.1 for Tokyo, and 2.2.2.2

e VPN tunnel vpn1. By defining e can direct all traffic bound for l.1 is bound.

nfiguration does not require tion does not even require a

Trust Zone

Eth110.2.2.1/24

NAT

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

1. Interfaces � Security Zones and TunnelThe admin at the Tokyo office configures the security zone and tunnel interfappear in red in the above illustration. The admin at the Paris office does likappear in blue.

Ethernet3 is going to be the outgoing interface for VPN traffic and the remotfrom the other end of the tunnel.

Ethernet1 is in NAT mode so each admin can assign IP addresses to all thepasses from the Trust zone to the Untrust zone, the NetScreen device transthe packet headers to the address of the Untrust zone interface, ethernet3—for Paris.

For a route-based VPN, each admin binds the tunnel interface tunnel.1 to tha route to the address space of the remote office LAN, the NetScreen devicthat LAN to the tunnel.1 interface and thus through the tunnel to which tunne

Because policy-based NAT services are not needed, a route-based VPN cotunnel.1 to have an IP address/netmask, and a policy-based VPN configuratunnel interface.

Eth110.1.1.1/24

NAT

Internet

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

Eth3, 1.1.1.1/24tunnel.1, Unnumbered

Eth3, 2.2.2.2/24tunnel.1, Unnumbered

Page 109: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

95

. The admin at the Tokyo office at the Paris office does likewise

s1. Because the proxy IDs used ctly, you cannot use the unnel if you use a more specific

local and remote IP addresses filter the inbound and outbound

LAN

Trust Zone

Trust_LANTrust, 10.2.2.0/24ParisUntrust, 10.2.2.0/24

Eth110.2.2.1/24

NAT

then the proxy IDs do not

match and IKE

negotiations will fail.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesThe admins define addresses for later use in inbound and outbound policiesdefines the addresses that appear in red in the above illustration. The admin with the addresses that appear in blue.For policy-based VPNs, the NetScreen device derives proxy IDs from policieby the NetScreen devices at both ends of the VPN tunnel must match perfepredefined address “ANY”, whose IP address is 0.0.0.0/0, at one end of the taddress at the other end. For example,

For route-based VPNs, you can use “0.0.0.0/0–0.0.0.0/0–any” to define the and service type for a proxy ID. You can then use more restrictive policies toVPN traffic by source address, destination address, and service type.

1. In ScreenOS 5.0.0, you can also define proxy IDs for VPN tunnels referenced in policy-based VPN configurations.

LAN Internet

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

Trust_LANTrust, 10.1.1.0/24TokyoUntrust, 10.1.1.0/24

Eth110.1.1.1/24

NAT

Eth3, 1.1.1.1/24tunnel.1, Unnumbered

Eth3, 2.2.2.2/24tunnel.1, Unnumbered

If the proxy ID in Tokyo is … and the proxy ID in Paris is …

From: 0.0.0.0/0 To: 10.1.1.0/24

To: 10.2.2.0/24 From: 10.2.2.0/24

Service: ANY Service: ANY

!

""

Page 110: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

96

sh—that is, change—the als (known as key lifetimes). gh excessively short lifetimes

IP address. Because the IP ns begin, hosts behind the peer on—the peer must send an IKE e to identify itself.

and authentication keys .

Trust Zone

LANTrust_LANTrust, 10.2.2.0/24ParisUntrust, 10.2.2.0/24Eth1

10.2.2.1/24NAT

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNYou can configure one of the following three VPNs:

– AutoKey IKE

The AutoKey IKE method uses a preshared key or a certificate to refreencryption and authentication keys automatically at user-defined intervEssentially, frequently updating these keys strengthens security, althoumight reduce overall performance.

– Dynamic Peer

A dynamic peer is a remote gateway that has a dynamically assigned address of the remote peer might be different each time IKE negotiatiomust initiate VPN traffic. Also—if using a preshared key for authenticatiID during the first message of Phase 1 negotiations in aggressive mod

– Manual Key

The Manual Key method requires you to set and update the encryptionmanually. This method is a viable option for a small set of VPN tunnels

Internet

Tunnel: vpn1

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

LANTrust_LANTrust, 10.1.1.0/24TokyoUntrust, 10.1.1.0/24

Eth110.1.1.1/24

NAT

Eth3, 1.1.1.1/24tunnel.1, Unnumbered

Eth3, 2.2.2.2/24tunnel.1, Unnumbered

Page 111: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

97

l.1

, to reach the internet via yo office and 2.2.2.250 for

en device forwards any traffic

point of view of the Paris office, the with its default gateway IP address.

Trust Zone

LAN

trust-vrDst 10.1.1.0/24Use tunnel.1Dst 0.0.0.0/0Use eth3gateway: 2.2.2.250

Trust_LANTrust, 10.2.2.0/24ParisUntrust, 10.2.2.0/24Eth1

10.2.2.1/24NAT

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RoutesThe admins at each site must configure at least the following two routes:

– A route for traffic to reach an address on the remote LAN to use tunne

– A default route for all other traffic, including the outer VPN tunnel trafficethernet3 and then the external router beyond it—1.1.1.250 for the TokParis2. The external router is the default gateway to which the NetScrefor which it does not have a specific route in its routing table.

2. If the NetScreen device at the Tokyo office receives its external IP address dynamically from its ISP (that is, from theNetScreen device at the Tokyo office is its dynamic peer), then the ISP automatically provides the Tokyo NetScreen

Internet

Tunnel: vpn1

trust-vrDst 10.2.2.0/24Use tunnel.1Dst 0.0.0.0/0Use eth3gateway: 1.1.1.250

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

LANTrust_LANTrust, 10.1.1.0/24TokyoUntrust, 10.1.1.0/24

Eth3, 1.1.1.1/24

Eth3, 2.2.2.2/24

tunnel.1, Unnumbered

external router, 1.1.1.250

tunnel.1, Unnumbered

external router, 2.2.2.250

Eth110.1.1.1/24

NAT

Page 112: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

98

ces:e to “Paris” or “Tokyo” in the

rust zone to “Trust_LAN” in the

e VPN tunnel vpn1, the policy

Trust Zone

LAN

trust-vrDst 10.1.1.0/24Use tunnel.1Dst 0.0.0.0/0Use eth3gateway: 2.2.2.250

Trust -> UntrustTrust_LAN -> ParisANY, PermitUntrust -> TrustParis-> Trust_LANANY, Permit

Trust_LANTrust, 10.2.2.0/24ParisUntrust, 10.2.2.0/24Eth1

10.2.2.1/24NAT

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesThe admins at each site define policies to permit traffic between the two offi

– A policy permitting any kind of traffic from “Trust_LAN” in the Trust zonUntrust zone

– A policy permitting any kind of traffic from “Paris” or “Tokyo” in the UntTrust zone

Because the route to the remote site specifies tunnel.1, which is bound to thdoes not need to reference the VPN tunnel.

Eth3, 1.1.1.1/24

Eth3, 2.2.2.2/24

tunnel.1, Unnumbered

external router, 1.1.1.250

tunnel.1, Unnumbered

external router, 2.2.2.250

Internet

Tunnel: vpn1

trust-vrDst 10.2.2.0/24Use tunnel.1Dst 0.0.0.0/0Use eth3gateway: 1.1.1.250

Untrust Zone

Untrust ZoneTrust Zone TokyoOffice

ParisOffice

LANTrust_LANTrust, 10.1.1.0/24TokyoUntrust, 10.1.1.0/24

Trust -> UntrustTrust_LAN -> ParisANY, PermitUntrust -> TrustParis-> Trust_LANANY, Permit

Eth110.1.1.1/24

NAT

Page 113: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

99

ertificates (one at each end of r the Phase 1 and 2 security key method or rsa-g2-3des-sha . All zones are in the trust-vr.

ificates involves the following

nd to the tunnel interface.

e, bind it to the tunnel interface,

ParisTrust Zone

eth1, 10.2.2.1/24

Trust Zone

t

Paris

Topology of the zones figured on the NetScreen

device in Paris.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Route-Based Site-to-Site VPN, AutoKey IKEIn this example, an AutoKey IKE tunnel using either a preshared secret or a pair of cthe tunnel) provides the secure connection between the Tokyo and Paris offices. Folevels, you specify one Phase 1 proposal—either pre-g2-3des-sha for the preshared for certificates—and select the predefined “Compatible” set of proposals for Phase 2

Setting up a route-based AutoKey IKE tunnel using either a preshared secret or certsteps:

1. Assign IP addresses to the physical interfaces bound to the security zones a

2. Configure the VPN tunnel, designate its outgoing interface in the Untrust zonand configure its proxy-ID.

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24Gateway 1.1.1.250

VPN Tunnel

Internet

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

Topology of the zones configured on the NetScreen

device in Tokyo.

Trust Zone

Untrust Zone

UntrusZone

TokyoParisTokyo

con

Tunnel InterfaceTunnel.1

Tunnel InterfaceTunnel.1

Page 114: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

100

oks for the Trust and Untrust

destination via the tunnel

participants already have RSA bout obtaining and loading

k Apply :

k OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. Enter the IP addresses for the local and remote endpoints in the address bozones.

4. Enter a default route to the external router in the trust-vr, and a route to the interface.

5. Set up policies for VPN traffic to pass between each site.

In the following examples, the preshared key is h1p8A24nG5. It is assumed that bothcertificates and are using Entrust as the certificate authority (CA). (For information acertificates, see “Certificates and CRLs” on page 29.)

WebUI (Tokyo)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Page 115: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

101

K :

click OK:

tname: 2.2.2.2

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Paris

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Page 116: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

102

ttings, and then click Return to age:

ecurity Level): pre-g2-3des-sha

tion)

ttings, and then click Return to age:

ecurity Level): rsa-g2-3des-sha

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Mode (Initiator): Main (ID Protec

(or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Tokyo_Paris

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Paris

Page 117: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

103

ttings, and then click Return to on page:

l.1

4

0/24

then click OK:

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Security Level: Compatible

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.1.1.0/2

Remote IP / Netmask: 10.2.2.

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.2.2.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

Page 118: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

104

OK :

ick OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Paris

Source Address: Trust_LAN

Destination Address: Paris_Office

Service: ANY

Action: Permit

Position at Top: (select)

Policies > (From: Untrust, To: Trust) > New: Enter the following, and then cl

Name: From Paris

Source Address: Paris_Office

Destination Address: Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 119: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

105

k Apply :

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LANIP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24Zone: Trust

Page 120: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

106

click OK:

tname: 1.1.1.1

ttings, and then click Return to age:

Security Level):

tion)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Tokyo

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Main (ID Protec

(or)

Page 121: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

107

ttings, and then click Return to age:

ecurity Level): rsa-g2-3des-sha

ttings, and then click Return to on page:

l.1

4

0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

Name: Paris_Tokyo

Security Level: Custom

Remote Gateway:

Predefined: (select), To_Tokyo

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Security Level: Compatible

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.2.2.0/2

Remote IP / Netmask: 10.1.1.

Service: ANY

Page 122: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

108

d then click OK :

d then click OK :

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 10.1.1.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Tokyo

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Tokyo_Office

Service: ANY

Action: Permit

Position at Top: (select)

Page 123: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

109

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Name: From Tokyo

Source Address:

Address Book Entry: (select), Tokyo_Office

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust Paris_Office 10.2.2.0/24

Page 124: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

110

nterface ethernet3

e

-ip 10.2.2.0/24 any

nterface ethernet3

e

-ip 10.2.2.0/24 any

gateway 1.1.1.2501

t_LAN Paris_Office any

aris_Office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPN

Preshared Key

set ike gateway To_Paris address 2.2.2.2 main outgoing-ipreshare h1p8A24nG5 proposal pre-g2-3des-sha

set vpn Tokyo_Paris gateway To_Paris sec-level compatiblset vpn Tokyo_Paris bind interface tunnel.1set vpn Tokyo_Paris proxy-id local-ip 10.1.1.0/24 remote

(or)

Certificate

set ike gateway To_Paris address 2.2.2.2 main outgoing-iproposal rsa-g2-3des-sha

set ike gateway To_Paris cert peer-ca 13

set ike gateway To_Paris cert peer-cert-type x509-sigset vpn Tokyo_Paris gateway To_Paris sec-level compatiblset vpn Tokyo_Paris bind interface tunnel.1set vpn Tokyo_Paris proxy-id local-ip 10.1.1.0/24 remote

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.2.0/24 interface tunnel.

5. Policiesset policy top name “To Paris” from trust to untrust Trus

permitset policy top name “From Paris” from untrust to trust P

any permitsave

3. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

Page 125: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

111

nterface ethernet3

e

-ip 10.1.1.0/24 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Paris)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust Tokyo_Office 10.1.1.0/24

3. VPN

Preshared Key

set ike gateway To_Tokyo address 1.1.1.1 main outgoing-ipreshare h1p8A24nG5 proposal pre-g2-3des-sha

set vpn Paris_Tokyo gateway To_Tokyo sec-level compatiblset vpn Paris_Tokyo bind interface tunnel.1set vpn Paris_Tokyo proxy-id local-ip 10.2.2.0/24 remote

(or)

Page 126: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

112

nterface ethernet3

e

-ip 10.1.1.0/24 any

gateway 2.2.2.2501

t_LAN Tokyo_Office any

okyo_Office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificate

set ike gateway To_Tokyo address 1.1.1.1 main outgoing-iproposal rsa-g2-3des-sha

set ike gateway To_Tokyo cert peer-ca 1set ike gateway To_Tokyo cert peer-cert-type x509-sigset vpn Paris_Tokyo gateway To_Tokyo sec-level compatiblset vpn Paris_Tokyo bind interface tunnel.1set vpn Paris_Tokyo proxy-id local-ip 10.2.2.0/24 remote

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.1.1.0/24 interface tunnel.

5. Policiesset policy top name “To Tokyo” from trust to untrust Trus

permitset policy top name “From Tokyo” from untrust to trust T

any permit save

Page 127: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

113

ertificates (one at each end of r the Phase 1 and 2 security key method or rsa-g2-3des-sha . All zones are in the trust-vr.

t or certificates involves the

ParisTrust Zone1, 10.2.2.1/24

Trust Zone

Paris

opology of the zones igured on the NetScreen

device in Paris.

Untrust-Tun Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Policy-Based Site-to-Site VPN, AutoKey IKEIn this example, an AutoKey IKE tunnel using either a preshared secret or a pair of cthe tunnel) provides the secure connection between the Tokyo and Paris offices. Folevels, you specify one Phase 1 proposal—either pre-g2-3des-sha for the preshared for certificates—and select the predefined “Compatible” set of proposals for Phase 2

Setting up the AutoKey IKE tunnel using AutoKey IKE with either a preshared secrefollowing steps:

1. Define security zone interface IP addresses.

2. Make address book entries for the local and remote end entities.

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24Gateway 1.1.1.250

VPN Tunnel

Interneteth

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

Topology of the zones configured on the NetScreen

device in Tokyo.

Trust Zone

Untrust Zone

UntrustZone

TokyoParisTokyo

Tconf

Untrust-Tun Zone

Page 128: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

114

eshared secret or a certificate.

participants already have RSA bout obtaining and loading

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. Define the remote gateway and key exchange mode, and specify either a pr

4. Create the Autokey IKE VPN.

5. Set a default route to the external router.

6. Configure policies.

In the following examples, the preshared key is h1p8A24nG5. It is assumed that bothcertificates and are using Entrust as the certificate authority (CA). (For information acertificates, see “Certificates and CRLs” on page 29.)

WebUI (Tokyo)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Page 129: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

115

click OK :

tname: 2.2.2.2

ttings, and then click OK to age:

Security Level):

tion)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Paris

Security Level: Custom

Remote Gateway Type:Static IP Address: (select), IP Address/Hos

Preshared KeyPreshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Main (ID Protec

Page 130: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

116

ttings, and then click OK to age:

Security Level):

tion)

aris

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

(or)

CertificatesOutgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Main (ID Protec

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: Tokyo_Paris

Security Level: Compatible

Remote Gateway: Predefined: (select), To_P

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Page 131: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

117

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To/From Paris

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Paris_Office

Service: ANY

Action: Tunnel

Tunnel VPN: Tokyo_Paris

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 132: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

118

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

Page 133: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

119

click OK :

tname: 1.1.1.1

ttings, and then click Return to age:

Security Level):

tion)

ttings, and then click Return to age:

Security Level):

tion)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Tokyo

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared KeyPreshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Main (ID Protec

(or)

CertificatesOutgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Main (ID Protec

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

Page 134: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

120

kyo

then click OK:

OK:

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Paris_Tokyo

Security Level: Compatible

Remote Gateway: Predefined: (select), To_To

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To/From Tokyo

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Tokyo_Office

Service: ANY

Action: Tunnel

Tunnel VPN: Paris_Tokyo

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 135: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

121

nterface ethernet3

e

nterface ethernet3

e

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust paris_office 10.2.2.0/24

3. VPN

Preshared Keyset ike gateway to_paris address 2.2.2.2 main outgoing-i

preshare h1p8A24nG5 proposal pre-g2-3des-shaset vpn tokyo_paris gateway to_paris sec-level compatibl

(or)

Certificatesset ike gateway to_paris address 2.2.2.2 main outgoing-i

proposal rsa-g2-3des-shaset ike gateway to_paris cert peer-ca 14

set ike gateway to_paris cert peer-cert-type x509-sigset vpn tokyo_paris gateway to_paris sec-level compatibl

4. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

Page 136: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

122

gateway 1.1.1.250

t Trust_LAN

t paris_office

nterface ethernet3

e

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy top name “To/From Paris” from trust to untrus

paris_office any tunnel vpn tokyo_parisset policy top name “To/From Paris” from untrust to trus

Trust_LAN any tunnel vpn tokyo_paris save

CLI (Paris)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

2. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust tokyo_office 10.1.1.0/24

3. VPN

Preshared Key

set ike gateway to_tokyo address 1.1.1.1 main outgoing-ipreshare h1p8A24nG5 proposal pre-g2-3des-sha

set vpn paris_tokyo gateway to_tokyo sec-level compatibl

(or)

Page 137: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

123

nterface ethernet3

fs-esp-3des-sha

gateway 2.2.2.250

t Trust_LAN

t tokyo_office

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

set ike gateway to_tokyo address 1.1.1.1 main outgoing-iproposal rsa-g2-3des-sha

set ike gateway to_tokyo cert peer-ca 1set ike gateway to_tokyo cert peer-cert-type x509-sigset vpn paris_tokyo gateway to_tokyo tunnel proposal nop

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy top name “To/From Tokyo” from trust to untrus

tokyo_office any tunnel vpn paris_tokyoset policy top name “To/From Tokyo” from untrust to trus

Trust_LAN any tunnel vpn paris_tokyo save

Page 138: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

124

certificates (one at each end of Tokyo and Paris offices. The dress. The ISP serving the HCP. Because only the Paris from hosts in the Tokyo office. er end. All security and tunnel

Parisrust Zone, 10.2.2.1/24

Trust Zone

Paris

the zones on the ice in Paris.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Route-Based Site-to-Site VPN, Dynamic PeerIn this example, an AutoKey IKE VPN tunnel using either a preshared key or a pair ofthe tunnel) provides a secure connection between NetScreen devices protecting theUntrust zone interface for the NetScreen device at the Paris office has a static IP adTokyo office assigns the IP address for the Untrust zone interface dynamically via DNetScreen device has a fixed address for its Untrust zone, VPN traffic must originateAfter a tunnel has been established, traffic through the tunnel can originate from eithzones are in the trust-vr.

Internet

VPN Tunnel

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3 and gatewaydynamically assigned

by ISPT

eth1

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

DHCP Server2.1.1.5Tunnel Interface

Tunnel.1Tunnel Interface

Tunnel.1

Topology of the zones configured on the

NetScreen device in Tokyo.

Trust Zone

Untrust Zone

Untrust Zone

TokyoParisTokyo

Topology of configured

NetScreen dev

Page 139: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

125

e RSA certificates from the pears in the local certificate on

ates and CRLs” on page 29.) -g2-3des-sha for the preshared roposals for Phase 2.

k Apply :

k Apply :

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The preshared key is h1p8A24nG5. It is assumed that both participants already havcertificate authority (CA) Verisign, and that the e-mail address [email protected] apNetScreen-A. (For information about obtaining and loading certificates, see “CertificFor the Phase 1 and 2 security levels, you specify one Phase 1 proposal—either prekey method or rsa-g2-3des-sha for certificates—and select the “Compatible” set of p

WebUI (Tokyo)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Enter the following, and then click OK :

Obtain IP using DHCP: (select)5

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

5. You cannot specify the IP address of the DHCP server through the WebUI; however, you can do so through the CLI.

Page 140: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

126

click OK :

tname: 2.2.2.2

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Paris

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key

Preshared Key: h1p8A24nG5

Local ID: [email protected]

Outgoing Interface: ethernet3

Page 141: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

127

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

(or)

Certificates

Local ID: [email protected]

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

6. The U-FQDN “[email protected]” must appear in the SubjectAltName field in the certificate.

Page 142: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

128

ttings, and then click Return to on page:

t), tunnel.1

4

.0/24

then click OK:

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Tokyo_Paris

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Paris

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface: (selec

Proxy-ID: (select)

Local IP / Netmask: 10.1.1.0/2

Remote IP / Netmask: 10.2.2

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 0.0.0.07

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.2.2.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

7. The ISP provides the gateway IP address dynamically through DHCP.

Page 143: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

129

OK:

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Paris_Office

Service: Any

Action: Permit

Position at Top: (select)

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Paris_Office

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: Any

Action: Permit

Position at Top: (select)

Page 144: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

130

k Apply :

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address: 2.2.2.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Trust

Page 145: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

131

click OK :

[email protected]

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Tokyo

Security Level: Custom

Remote Gateway Type:

Dynamic IP Address: (select), Peer ID: pma

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

(or)

Page 146: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

132

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to on page:

t), tunnel.1

4

.0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Paris_Tokyo

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Tokyo

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface: (selec

Proxy-ID: (select)

Local IP / Netmask: 10.2.2.0/2

Remote IP / Netmask: 10.1.1

Service: ANY

Page 147: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

133

then click OK:

then click OK:

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: (select), 2.2.2.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.1.1.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Tokyo_Office

Service: Any

Action: Permit

Position at Top: (select)

Page 148: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

134

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Tokyo_Office

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: Any

Action: Permit

Position at Top: (select)

Page 149: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

135

1.5

l-id [email protected] posal pre-g2-3des-shampatible

-ip 10.2.2.0/24 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 dhcp clientset interface ethernet3 dhcp client settings server 1.1.

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust Paris_Office 10.2.2.0/24

3. VPN

Preshared Keyset ike gateway To_Paris address 2.2.2.2 aggressive loca

outgoing-interface ethernet3 preshare h1p8A24nG5 proset vpn Tokyo_Paris gateway To_Paris tunnel sec-level coset vpn Tokyo_Paris bind interface tunnel.1set vpn Tokyo_Paris proxy-id local-ip 10.1.1.0/24 remote

(or)

Page 150: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

136

l-id [email protected] a

mpatible

-ip 10.2.2.0/24 any

10

1

ice any permitLAN any permit

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificatesset ike gateway To_Paris address 2.2.2.2 aggressive loca

outgoing-interface ethernet3 proposal rsa-g2-3des-shset ike gateway To_Paris cert peer-ca 19

set ike gateway To_Paris cert peer-cert-type x509-sigset vpn Tokyo_Paris gateway To_Paris tunnel sec-level coset vpn Tokyo_Paris bind interface tunnel.1set vpn Tokyo_Paris proxy-id local-ip 10.1.1.0/24 remote

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.2.0/24 interface tunnel.

5. Policiesset policy top from trust to untrust Trust_LAN Paris_Offset policy top from untrust to trust Paris_Office Trust_save

8. The U-FQDN “[email protected]” must appear in the SubjectAltName field in the certificate.

9. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

10. The ISP provides the gateway IP address dynamically through DHCP, so you cannot specify it here.

Page 151: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

137

ve outgoing-interface hampatible

-ip 10.1.1.0/24 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Paris)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust Tokyo_Office 10.1.1.0/24

3. VPN

Preshared Keyset ike gateway To_Tokyo dynamic [email protected] aggressi

ethernet3 preshare h1p8A24nG5 proposal pre-g2-3des-sset vpn Paris_Tokyo gateway To_Tokyo tunnel sec-level coset vpn Paris_Tokyo bind interface tunnel.1set vpn Paris_Tokyo proxy-id local-ip 10.2.2.0/24 remote

(or)

Page 152: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

138

ve outgoing-interface

mpatible

-ip 10.1.1.0/24 any

gateway 2.2.2.2501

ice any permitLAN any permit

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificatesset ike gateway To_Tokyo dynamic [email protected] aggressi

ethernet3 proposal rsa-g2-3des-shaset ike gateway To_Tokyo cert peer-ca 111

set ike gateway To_Tokyo cert peer-cert-type x509-sigset vpn Paris_Tokyo gateway To_Tokyo tunnel sec-level coset vpn Paris_Tokyo bind interface tunnel.1set vpn Paris_Tokyo proxy-id local-ip 10.2.2.0/24 remote

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.1.1.0/24 interface tunnel.

5. Policiesset policy top from trust to untrust Trust_LAN Tokyo_Offset policy top from untrust to trust Tokyo_Office Trust_save

11. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

Page 153: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

139

NetScreen-A to the mail server r NetScreen-B has a static IP terface dynamically via DHCP. t originate from hosts behind l can originate from either end.

Mail Server3.3.3.5

IDENTRequest

DMZ Zone

st

B

Topology of the zones nfigured on NetScreen-B at the corporate site.

rporate OfficeDMZ Zone2, 3.3.3.3/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Policy-Based Site-to-Site VPN, Dynamic PeerIn this example, a VPN tunnel securely connects the users in the Trust zone behind in the corporate DMZ zone, protected by NetScreen-B. The Untrust zone interface foaddress. The ISP serving NetScreen-A assigns the IP address for its Untrust zone inBecause only NetScreen-B has a fixed address for its Untrust zone, VPN traffic musNetScreen-A. After NetScreen-A has established the tunnel, traffic through the tunneAll zones are in the trust-vr routing domain.

Internet

VPN TunnelNetScreen-A NetScreen-BSMTP or POP3Request

Topology of the zones configured on NetScreen-A

at the branch office.

Trust Zone

Untrust Zone

UntruZone

ABA

co

Branch OfficeTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3 and gatewaydynamically assigned

by ISP

Co

eth

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

Note: Before making an SMTP or POP3 connection to the corporate mail server, Phil must first initiate an HTTP, FTP, or Telnet connection so that NetScreen-A can authenticate him.

DHCP Server2.1.1.5

Page 154: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

140

wants to get his e-mail from the ce: first, NetScreen-A d, the mail server program

RSA certificates from the pears in the local certificate on tes and CRLs” on page 29.) For des-sha for the preshared key et of proposals for Phase 2.

k Apply :

, FTP, or Telnet connection so that he has permission to contact the

tScreen-A and B administrators rough the tunnel to the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

In this example, the local auth user Phil (login name: pmason; password: Nd4syst4) mail server at the corporate site. When he attempts to do so, he is authenticated twiauthenticates him locally before allowing traffic from him through the tunnel12; seconauthenticates him, sending the IDENT request through the tunnel.

The preshared key is h1p8A24nG5. It is assumed that both participants already havecertificate authority (CA) Verisign, and that the e-mail address [email protected] apNetScreen-A. (For information about obtaining and loading certificates, see “Certificathe Phase 1 and 2 security levels, you specify one Phase 1 proposal—either pre-g2-3method or rsa-g2-3des-sha for certificates—and select the predefined “Compatible” s

WebUI (NetScreen-A)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

12. Because Phil is an authentication user, before he can make an SMTP of POP3 request, he must first initiate an HTTPNetScreen-A can respond with a firewall user/login prompt to authenticate him. After NetScreen-A authenticates him,corporate mail server via the VPN tunnel.

Note: The mail server can send the IDENT request through the tunnel only if the Neadd a custom service for it (TCP, port 113) and set up policies allowing that traffic th10.10.10.0/24 subnet.

Page 155: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

141

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Obtain IP using DHCP: (select)13

2. UserObjects > Users > Local > New: Enter the following, and then click OK :

User Name: pmason

Status: Enable

Authentication User: (select)

User Password: Nd4syst4

Confirm Password: Nd4syst4

3. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trusted network

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Mail Server

IP Address/Domain Name:

IP/Netmask: (select), 3.3.3.5/32

Zone: Untrust

13. You cannot specify the IP address of the DHCP server through the WebUI; however, you can do so through the CLI.

Page 156: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

142

:

services, and then click OK :

click OK:

tname: 2.2.2.2

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. ServicesObjects > Services > Custom > New: Enter the following, and then click OK

Service Name: Ident

Service Timeout:

Use protocol default: (select)

Transport Protocol: TCP (select)

Source Port: Low 0, High 65535

Destination Port: Low 113, High 113

Objects > Services > Group > New: Enter the following, move the following

Group Name: Remote_Mail

Group Members << Available Members:

HTTPFTPTelnetIdentMAILPOP3

5. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Mail

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Page 157: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

143

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preshared KeyPreshared Key: h1p8A24nG5

Local ID: [email protected]

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

(or)

CertificatesLocal ID: [email protected]

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

Page 158: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

144

then click OK:

OK :

ork

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

Name: branch_corp

Security Level: Compatible

Remote Gateway Tunnel: To_Mail

6. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 0.0.0.014

7. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Trusted netw

Destination Address:

Address Book Entry: (select), Mail Server

Service: Remote_Mail

Action: Tunnel

VPN Tunnel: branch_corp

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

14. The ISP provides the gateway IP address dynamically through DHCP.

Page 159: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

145

ttings, and then click Return to e:

r - pmason

k OK:

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

Authentication: (select)

Auth Server: Local

User: (select), Local Auth Use

WebUI (NetScreen-B)

1. InterfacesNetwork > Interfaces > Edit (for ethernet2): Enter the following, and then clic

Zone Name: DMZ

Static IP: (select this option when present)

IP Address/Netmask: 3.3.3.3/24

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Mail Server

IP Address/Domain Name:

IP/Netmask: (select), 3.3.3.5/32

Zone: DMZ

Page 160: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

146

:

services, and then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: branch office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. ServicesObjects > Services > Custom > New: Enter the following, and then click OK

Service Name: Ident

Service Timeout:

Use protocol default: (select)

Transport Protocol: TCP (select)

Source Port: Low 0, High 65535

Destination Port: Low 113, High 113

Objects > Services > Group > New: Enter the following, move the following

Group Name: Remote_Mail

Group Members << Available Members:

Ident

MAIL

POP3

Page 161: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

147

click OK:

[email protected]

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_branch

Security Level: Custom

Remote Gateway Type:

Dynamic IP Address: (select), Peer ID: pma

Preshared KeyPreshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: CustomPhase 1 Proposal (For Custom

pre-g2-3des-shaMode (Initiator): Aggressive

(or)

CertificatesOutgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: CustomPhase 1 Proposal (For Custom

rsa-g2-3des-shaMode (Initiator): AggressivePreferred Certificate (optional):

Peer CA: VerisignPeer Type: X509-SIG

Page 162: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

148

then click OK :

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: corp_branch

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_branch

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

6. PoliciesPolicies > (From: DMZ, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Mail Server

Destination Address:

Address Book Entry: (select), branch office

Service: Remote_Mail

Action: Tunnel

VPN Tunnel: corp_branch

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 163: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

149

1.5

113-113

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-A)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 dhcp clientset interface ethernet3 dhcp client settings server 1.1.

2. Userset user pmason password Nd4syst4

3. Addressesset address trust “trusted network” 10.1.1.0/24set address untrust “mail server” 3.3.3.5/32

4. Servicesset service ident protocol tcp src-port 0-65535 dst-portset group service remote_mailset group service remote_mail add httpset group service remote_mail add ftpset group service remote_mail add telnetset group service remote_mail add identset group service remote_mail add mailset group service remote_mail add pop3

Page 164: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

150

-id [email protected] posal pre-g2-3des-sha

-id [email protected] a

17

mail server” user pmasonted network”

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. VPN

Preshared Keyset ike gateway to_mail address 2.2.2.2 aggressive local

outgoing-interface ethernet3 preshare h1p8A24nG5 proset vpn branch_corp gateway to_mail sec-level compatible

(or)

Certificatesset ike gateway to_mail address 2.2.2.2 aggressive local

outgoing-interface ethernet3 proposal rsa-g2-3des-shset ike gateway to_mail cert peer-ca 116

set ike gateway to_mail cert peer-cert-type x509-sigset vpn branch_corp gateway to_mail sec-level compatible

6. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

7. Policiesset policy top from trust to untrust “trusted network” “

remote_mail tunnel vpn branch_corp auth server Localset policy top from untrust to trust “mail server” “trus

remote_mail tunnel vpn branch_corpsave

15. The U-FQDN “[email protected]” must appear in the SubjectAltName field in the certificate.

16. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

17. The ISP provides the gateway IP address dynamically through DHCP.

Page 165: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

151

113-113

ive outgoing-interface ha ompatible

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-B)

1. Interfacesset interface ethernet2 zone dmzset interface ethernet2 ip 3.3.3.3/24

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

2. Addressesset address dmz “mail server” 3.3.3.5/32set address untrust “branch office” 10.1.1.0/24

3. Servicesset service ident protocol tcp src-port 0-65535 dst-portset group service remote_mailset group service remote_mail add identset group service remote_mail add mailset group service remote_mail add pop3

4. VPN

Preshared Key

set ike gateway to_branch dynamic [email protected] aggressethernet3 preshare h1p8A24nG5 proposal pre-g2-3des-s

set vpn corp_branch gateway to_branch tunnel sec-level c

(or)

Page 166: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

152

ive outgoing-interface

le

gateway 2.2.2.250

office” remote_mail

server” remote_mail

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

set ike gateway to_branch dynamic [email protected] aggressethernet3 proposal rsa-g2-3des-sha

set ike gateway to_branch cert peer-ca 118

set ike gateway to_branch cert peer-cert-type x509-sigset vpn corp_branch gateway to_branch sec-level compatib

5. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policiesset policy top from dmz to untrust “mail server” “branch

tunnel vpn corp_branchset policy top from untrust to dmz “branch office” “mail

tunnel vpn corp_branchsave

18. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

Page 167: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

153

een offices in Tokyo and Paris.

ust zone interface (ethernet3)

ernet1): 10.2.2.1/24

thernet3): 2.2.2.2/24

ParisTrust Zone

eth1, 10.2.2.1/24

Trust Zone

st

Paris

Topology of the zones nfigured on the NetScreen

device in Paris.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Route-Based Site-to-Site VPN, Manual KeyIn this example, a Manual Key tunnel provides a secure communication channel betwThe Trust zones at each site are in NAT mode. The addresses are as follows:

The Trust and Untrust security zones are all in the trust-vr routing domain. The Untrserves as the outgoing interface for the VPN tunnel.

• Tokyo:

- Trust zone interface (ethernet1): 10.1.1.1/24

- Untrust zone interface (ethernet3): 1.1.1.1/24

• Paris:

- Trust zone interface (eth

- Untrust zone interface (e

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24Gateway 1.1.1.250

VPN Tunnel

Internet

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

Topology of the zones configured on the NetScreen

device in Tokyo.

Trust Zone

Untrust Zone

UntruZone

TokyoParisTokyo

co

Tunnel Interfacetunnel.1

Tunnel Interfacetunnel.1

Page 168: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

154

nds of the tunnel:

nd to the tunnel interface.

ne, and bind it to the tunnel

oks for the Trust and Untrust

destination via the tunnel

k Apply :

k OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To set up the tunnel, perform the following steps on the NetScreen devices at both e

1. Assign IP addresses to the physical interfaces bound to the security zones a

2. Configure the VPN tunnel, designate its outgoing interface in the Untrust zointerface.

3. Enter the IP addresses for the local and remote endpoints in the address bozones.

4. Enter a default route to the external router in the trust-vr, and a route to the interface.

5. Set up policies for VPN traffic to pass between each site.

WebUI (Tokyo)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Page 169: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

155

K :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > Manual Key > New: Enter the following, and then click OK :

VPN Tunnel Name: Tokyo_Paris

Gateway IP: 2.2.2.2

Security Index: 3020 (Local), 3030 (Remote)

Outgoing Interface: ethernet3

ESP-CBC: (select)

Encryption Algorithm: 3DES-CBC

Page 170: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

156

ttings, and then click Return to guration page:

l.1

then click OK:

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Generate Key by Password: asdlk24234

Authentication Algorithm: SHA-1

Generate Key by Password: PNas134a

> Advanced: Enter the following advanced sereturn to the basic Manual Key tunnel confi

Bind to: Tunnel Interface, tunne

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.2.2.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

Page 171: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

157

OK :

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Paris

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Paris_Office

Service: ANY

Action: Permit

Position at Top: (select)

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Name: From Paris

Source Address:

Address Book Entry: (select), Paris_Office

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 172: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

158

k Apply :

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Trust

Page 173: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

159

ttings, and then click Return to guration page:

l.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > Manual Key > New: Enter the following, and then click OK :

VPN Tunnel Name: Paris_Tokyo

Gateway IP: 1.1.1.1

Security Index: 3030 (Local), 3020 (Remote)

Outgoing Interface: ethernet3

ESP-CBC: (select)

Encryption Algorithm: 3DES-CBC

Generate Key by Password: asdlk24234

Authentication Algorithm: SHA-1

Generate Key by Password: PNas134a

> Advanced: Enter the following advanced sereturn to the basic Manual Key tunnel confi

Bind to: Tunnel Interface, tunne

Page 174: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

160

d then click OK :

d then click OK :

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 10.1.1.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Tokyo

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Tokyo_Office

Service: ANY

Action: Permit

Position at Top: (select)

Page 175: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

161

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Name: From Tokyo

Source Address:

Address Book Entry: (select), Tokyo_Office

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 176: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

162

going-interface ssword PNas134a

gateway 1.1.1.2501

t_LAN Paris_Office any

aris_Office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust Paris_Office 10.2.2.0/24

3. VPNset vpn Tokyo_Paris manual 3020 3030 gateway 2.2.2.2 out

ethernet3 esp 3des password asdlk24234 auth sha-1 paset vpn Tokyo_Paris bind interface tunnel.1

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.2.0/24 interface tunnel.

5. Policiesset policy top name “To Paris” from trust to untrust Trus

permitset policy top name “From Paris” from untrust to trust P

any permit save

Page 177: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

163

going-interface ssword PNas134a

gateway 2.2.2.2501

t_LAN Tokyo_Office any

okyo_Office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Paris)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust Tokyo_Office 10.1.1.0/24

3. VPNset vpn Paris_Tokyo manual 3030 3020 gateway 1.1.1.1 out

ethernet3 esp 3des password asdlk24234 auth sha-1 paset vpn Paris_Tokyo bind interface tunnel.1

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.1.1.0/24 interface tunnel.

5. Policiesset policy top name “To Tokyo” from trust to untrust Trus

permitset policy top name “From Tokyo” from untrust to trust T

any permit save

Page 178: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

164

een offices in Tokyo and Paris, h site are in NAT mode. The

-vr routing domain. The Untrust

10.2.2.1/24

3): 2.2.2.2/24

ParisTrust Zone

th1, 10.2.2.1/24

Trust Zone

st

Paris

Topology of the zones nfigured on the NetScreen

device in Paris.

Untrust-Tun Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Policy-Based Site-to-Site VPN, Manual KeyIn this example, a Manual Key tunnel provides a secure communication channel betwusing ESP with 3DES encryption and SHA-1 authentication. The Trust zones at eacaddresses are as follows:

The Trust and Untrust security zones and the Untrust-Tun tunnel zone are in the trustzone interface (ethernet3) serves as the outgoing interface for the VPN tunnel.

• Tokyo:

- Trust interface (ethernet1): 10.1.1.1/24

- Untrust interface (ethernet3): 1.1.1.1/24

• Paris:

- Trust interface (ethernet1):

- Untrust interface (ethernet

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24Gateway 1.1.1.250

VPN Tunnel

Internete

Outgoing InterfaceUntrust Zone

eth3, 2.2.2.2/24Gateway 2.2.2.250

Topology of the zones configured on the NetScreen

device in Tokyo.

Trust Zone

Untrust Zone

UntruZone

TokyoParisTokyo

co

Untrust-Tun Zone

Page 179: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

165

th ends of the tunnel:

t zone.

ntrust address books.

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To set up the tunnel, perform the following five steps on the NetScreen devices at bo

1. Assign IP addresses to the physical interfaces bound to the security zones.

2. Configure the VPN tunnel, and designate its outgoing interface in the Untrus

3. Enter the IP addresses for the local and remote endpoints in the Trust and U

4. Enter a default route to the external router.

5. Set up policies for VPN traffic to pass bidirectionally through the tunnel.

WebUI (Tokyo)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

Page 180: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

166

ttings, and then click Return to guration page:

un

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > Manual Key > New: Enter the following, and then click OK :

VPN Tunnel Name: Tokyo_Paris

Gateway IP: 2.2.2.2

Security Index: 3020 (Local), 3030 (Remote)

Outgoing Interface: ethernet3

ESP-CBC: (select)

Encryption Algorithm: 3DES-CBC

Generate Key by Password: asdlk24234

Authentication Algorithm: SHA-1

Generate Key by Password: PNas134a

> Advanced: Enter the following advanced sereturn to the basic Manual Key tunnel confi

Bind to: Tunnel Zone, Untrust-T

Page 181: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

167

then click OK:

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To/From Paris

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Paris_Office

Service: ANY

Action: Tunnel

Tunnel VPN: Tokyo_Paris

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 182: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

168

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

Page 183: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

169

020 (Remote)

ttings, and then click Return to guration page:

un

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNVPNs > Manual Key > New: Enter the following, and then click OK :

VPN Tunnel Name: Paris_Tokyo

Gateway IP: 1.1.1.1

Security Index (HEX Number): 3030 (Local), 3

Outgoing Interface: ethernet3

ESP-CBC: (select)

Encryption Algorithm: 3DES-CBC

Generate Key by Password: asdlk24234

Authentication Algorithm: SHA-1

Generate Key by Password: PNas134a

> Advanced: Enter the following advanced sereturn to the basic Manual Key tunnel confi

Bind to: Tunnel Zone, Untrust-T

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Page 184: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

170

OK:

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To/From Tokyo

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Tokyo_Office

Service: ANY

Action: Tunnel

Tunnel VPN: Paris_Tokyo

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 185: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

171

going-interface ssword PNas134a

gateway 1.1.1.250

t Trust_LAN

t paris_office

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust paris_office 10.2.2.0/24

3. VPNset vpn tokyo_paris manual 3020 3030 gateway 2.2.2.2 out

ethernet3 esp 3des password asdlk24234 auth sha-1 paset vpn tokyo_paris bind zone untrust-tun

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy top name “To/From Paris” from trust to untrus

paris_office any tunnel vpn tokyo_parisset policy top name “To/From Paris” from untrust to trus

Trust_LAN any tunnel vpn tokyo_paris save

Page 186: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Site-to-Site VPN Configurations

172

going-interface ssword PNas134a

gateway 2.2.2.250

t Trust_LAN

t tokyo_office

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Paris)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

2. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust tokyo_office 10.1.1.0/24

3. VPNset vpn paris_tokyo manual 3030 3020 gateway 1.1.1.1 out

ethernet3 esp 3des password asdlk24234 auth sha-1 paset vpn paris_tokyo bind zone untrust-tun

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy top name “To/From Tokyo” from trust to untrus

tokyo_office any tunnel vpn paris_tokyoset policy top name “To/From Tokyo” from untrust to trus

Trust_LAN any tunnel vpn paris_tokyo save

Page 187: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

173

lified domain name (FQDN) in vider (ISP) might assign IP f addresses and assigns them has an unpredictably changing e Service (DNS) mapping of its

the DNS server to update its ew IP address from its ISP.

amic DNS software running on es so the server can update its

nation device, a host behind it NS server of address changes.

configure an AutoKey IKE VPN

28 = www.ns.com

DNS Server

IKE Peer

DHCP Server

2s.com

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

DYNAMIC IKE GATEWAYS USING FQDNFor an IKE peer that obtains its IP address dynamically, you can specify its fully quathe local configuration for the remote gateway. For example, an Internet service proaddresses via DHCP to its customers. The ISP draws addresses from a large pool owhen its customers come online. Although the IKE peer has an unchanging FQDN, itIP address. The IKE peer has three methods available for maintaining a Domain NamFQDN to its dynamically assigned IP address (a process known as dynamic DNS).

• If the remote IKE peer is a NetScreen device, the admin can manually notifyFQDN-to-IP address mapping each time the NetScreen device receives a n

• If the remote IKE peer is another kind of VPN termination device that has dynit, that software can automatically notify the DNS server of its address changFQDN-to-IP address mapping table.

• If the remote IKE peer is a NetScreen device or any other kind of VPN termican run an FQDN-to-IP address automatic update program that alerts the D

Without needing to know the current IP address of a remote IKE peer, you can now tunnel to that peer using its FQDN instead of an IP address.

2.2.2.

2.2.2.10 �2.2.7.9

IP Pool

Local NetScreen Device

1.1.1.1VPN Tunnel

Internet

1. The DHCP server draws 2.2.2.28 from its pool of IP addresses, and assigns that address to the IKE peer.

2. The IKE peer notifies the DNS server of the new address, so that the server can update its FQDN-to-IP address mapping table.

1

www.n

Page 188: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

174

at the local NetScreen device , the local device uses the first response from the DNS server, ight fail.

DNS Server

Remote IKE Peer

Remote IKE Peer

Remote IKE Peer

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

AliasesYou can also use an alias for the FQDN of the remote IKE peer if the DNS server thqueries returns only one IP address. If the DNS server returns several IP addressesone it receives. Because there is no guarantee for the order of the addresses in the the local NetScreen device might use the wrong IP address and IKE negotiations m

DNS Query: www.jnpr.net = IP ?

DNS Reply:www.jnpr.net = 1.1.1.202www.jnpr.net = 1.1.1.114www.jnpr.net = 1.1.1.20

The NetScreen device uses this IP address.

If the remote IKE peer is at 1.1.1.202, IKE negotiations succeed.

Local NetScreen Device

Local NetScreen Device

If the remote IKE peer is at 1.1.1.114

or1.1.1.20, IKE

negotiations fail.

Local NetScreen Device

The local NetScreen device wants to establish an IKE VPN tunnel with its remote peer. It uses www.jnpr.net as

the remote gateway address.

Local NetScreen Device

1

2

3a

3b

Page 189: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

175

ir of certificates (one at each aris. The Paris office has a (www.nspar.com) as the

ecurity levels, you specify one des-sha for certificates—and

trust-vr.

Trust Zone

Paris

opology of the zones igured on the NetScreen

device in Paris.

ParisTrust Zone

eth1, 10.2.2.1/24

l.11.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: AutoKey IKE Peer with FQDNIn this example, an AutoKey IKE VPN tunnel using either a preshared secret or a paend of the tunnel) provides a secure connection between two offices in Tokyo and Pdynamically assigned IP address, so the Tokyo office uses the remote peer’s FQDNaddress of the remote gateway in its VPN tunnel configuration.

The following configuration is for a route-based VPN tunnel. For the Phase 1 and 2 sPhase 1 proposal—either pre-g2-3des-sha for the preshared key method or rsa-g2-3select the predefined “Compatible” set of proposals for Phase 2. All zones are in the

Topology of the zones configured on the NetScreen

device in Tokyo.

Trust Zone

Untrust Zone

ParisTokyo

Untrust Zone

Tokyo

Tconf

TokyoTrust Zone

eth1, 10.1.1.1/24

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24Gateway 1.1.1.250

VPN Tunnel

Internet

Outgoing InterfaceUntrust Zone

eth3, IP and gateway via DHCP

www.nspar.com

Tunnel Interface: tunneRemote Gateway: 1.1.

Tunnel Interface: tunnel.1Remote Gateway: www.nspar.com

Page 190: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

176

ificates involves the following

nd to the tunnel interface.

eshared secret or a certificate

e, bind it to the tunnel interface,

ntrust address books.

destination via the tunnel

participants already have RSA bout obtaining and loading ume 4, VPNs .)

k Apply :

k OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Setting up a route-based AutoKey IKE tunnel using either a preshared secret or certsteps:

1. Assign IP addresses to the physical interfaces bound to the security zones a

2. Define the remote gateway and key exchange mode, and specify either a pr

3. Configure the VPN tunnel, designate its outgoing interface in the Untrust zonand configure its proxy-ID.

4. Enter the IP addresses for the local and remote endpoints in the Trust and U

5. Enter a default route to the external router in the trust-vr, and a route to the interface.

6. Set up policies for traffic to pass between each site.

In the following examples, the preshared key is h1p8A24nG5. It is assumed that bothcertificates and are using Entrust as the certificate authority (CA). (For information acertificates, see NetScreen Concepts & Examples ScreenOS Reference Guide, Vol

WebUI (Tokyo)1. Interfaces

Network > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1

Page 191: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

177

K :

click OK:

tname: www.nspar.com

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Paris_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Paris

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Page 192: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

178

ttings, and then click Return to age:

ecurity Level): pre-g2-3des-sha

tion)

ttings, and then click Return to age:

ecurity Level): rsa-g2-3des-sha

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Mode (Initiator): Main (ID Protec

(or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

Page 193: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

179

ttings, and then click Return to on page:

l.1

24

then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Tokyo_Paris

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Paris

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Security Level: Compatible

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.1.1.0/24

Remote IP / Netmask: 10.2.2.0/

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 0.0.0.019

19. The ISP provides the gateway IP address dynamically through DHCP.

Page 194: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

180

then click OK :

OK:

, and then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.2.2.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Paris

Source Address: Trust_LAN

Destination Address: Paris_Office

Service: ANY

Action: Permit

Position at Top: (select)

Policies > Policy (From: Untrust, To: Trust) > New Policy: Enter the following

Name: From Paris

Source Address: Paris_Office

Destination Address: Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 195: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

181

k Apply :

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Paris)

1. Host Name and Domain NameNetwork > DNS: Enter the following, and then click Apply :

Host Name: www

Domain Name: nspar.com

2. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Obtain IP using DHCP: (select)

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

Page 196: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

182

click OK:

tname: 1.1.1.1

ttings, and then click Return to age:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo_Office

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Tokyo

Security Level: Custom

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Page 197: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

183

Security Level):

tion)

ttings, and then click Return to age:

ecurity Level): rsa-g2-3des-sha

ttings, and then click Return to on page:

l.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Main (ID Protec

(or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (for Custom S

Preferred certificate (optional)

Peer CA: Entrust

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

Name: Paris_Tokyo

Security Level: Custom

Remote Gateway:

Predefined: (select), To_Tokyo

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Security Level: Compatible

Bind to: Tunnel Interface, tunne

Page 198: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

184

24

d then click OK :

d then click OK :

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Proxy-ID: (select)

Local IP / Netmask: 10.2.2.0/24

Remote IP / Netmask: 10.1.1.0/

Service: ANY

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, an

Network Address/Netmask: 10.1.1.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

6. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Name: To Tokyo

Source Address: Trust_LAN

Destination Address: Tokyo_Office

Service: ANY

Action: Permit

Position at Top: (select)

Page 199: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

185

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Name: From Tokyo

Source Address: Tokyo_Office

Destination Address: Trust_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 200: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

186

oing-interface hae

-ip 10.2.2.0/24 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust paris_office 10.2.2.0/24

3. VPN

Preshared Keyset ike gateway to_paris address www.nspar.com main outg

ethernet3 preshare h1p8A24nG5 proposal pre-g2-3des-sset vpn tokyo_paris gateway to_paris sec-level compatiblset vpn tokyo_paris bind interface tunnel.1set vpn tokyo_paris proxy-id local-ip 10.1.1.0/24 remote

(or)

Page 201: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

187

oing-interface

e

-ip 10.2.2.0/24 any

gateway 1.1.1.2501

t_LAN paris_office any

aris_office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificateset ike gateway to_paris address www.nspar.com main outg

ethernet3 proposal rsa-g2-3des-shaset ike gateway to_paris cert peer-ca 120

set ike gateway to_paris cert peer-cert-type x509-sigset vpn tokyo_paris gateway to_paris sec-level compatiblset vpn tokyo_paris bind interface tunnel.1set vpn tokyo_paris proxy-id local-ip 10.1.1.0/24 remote

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.2.0/24 interface tunnel.

5. Policiesset policy top name “To Paris” from trust to untrust Trus

permitset policy top name “From Paris” from untrust to trust p

any permit save

20. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get ike ca .

Page 202: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

188

nterface ethernet3

e

-ip 10.1.1.0/24 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Paris)

1. Host Name and Domain Nameset hostname wwwset domain nspar.com

2. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip dhcp-client enable

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

3. Addressesset address trust Trust_LAN 10.2.2.0/24set address untrust tokyo_office 10.1.1.0/24

4. VPN

Preshared Key

set ike gateway to_tokyo address 1.1.1.1 main outgoing-ipreshare h1p8A24nG5 proposal pre-g2-3des-sha

set vpn paris_tokyo gateway to_tokyo sec-level compatiblset vpn paris_tokyo bind interface tunnel.1set vpn paris_tokyo proxy-id local-ip 10.2.2.0/24 remote

(or)

Page 203: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Dynamic IKE Gateways Using FQDN

189

nterface ethernet3

e

-ip 10.1.1.0/24 any

gateway 2.2.2.2501

t_LAN tokyo_office any

okyo_office Trust_LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificate

set ike gateway to_tokyo address 1.1.1.1 main outgoing-iproposal rsa-g2-3des-sha

set ike gateway to_tokyo cert peer-ca 13

set ike gateway to_tokyo cert peer-cert-type x509-sigset vpn paris_tokyo gateway to_tokyo sec-level compatiblset vpn paris_tokyo bind interface tunnel.1set vpn paris_tokyo proxy-id local-ip 10.2.2.0/24 remote

5. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.1.1.0/24 interface tunnel.

6. Policiesset policy top name “To Tokyo” from trust to untrust Trus

permitset policy top name “From Tokyo” from untrust to trust t

any permit save

Page 204: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

190

that the addresses of protected entities with overlapping destination network address

tually unique subnets, with a VPN traffic can then apply a neutral address space.

traffic to an address that is as the local DIP pool used for creen device has an entry in its NAT-dst, see “Routing for

he MIP uses an address in the l DIP pool used for outbound ge 7 -90.)

both directions. Because the n inbound traffic—the NAT-dst and outbound policies cannot

e the interface IP address or any MIP dress and an accompanying DIP pool page 2 -275.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPN SITES WITH OVERLAPPING ADDRESSESBecause the range of private IP addresses is relatively small, there is a good chancenetworks of two VPN peers overlap21. For bidirectional VPN traffic between two endaddresses, the NetScreen devices at both ends of the tunnel must apply source andtranslation (NAT-src and NAT-dst) to the VPN traffic passing between them.

For NAT-src, the interfaces at both ends of the tunnel must have IP addresses in mudynamic IP (DIP) pool in each of those subnets 22. The policies regulating outbound NAT-src using DIP pool addresses to translate original source addresses to those in

To provide NAT-dst on inbound VPN traffic, there are two options:

• Policy-based NAT-dst: A policy can apply NAT-dst to translate inbound VPNeither in the same subnet as the tunnel interface—but not in the same rangeoutbound VPN traffic—or to an address in another subnet to which the NetSroute table. (For information about routing considerations when configuring NAT-Dst” on page 7 -40.)

• Mapped IP (MIP): A policy can reference a MIP as the destination address. Tsame subnet as the tunnel interface—but not in the same range as the locaVPN traffic. (For information about MIPs, see “Mapped IP Addresses” on pa

VPN traffic between sites with overlapping addresses requires address translation insource address on outbound traffic cannot be the same as the destination address oaddress or MIP cannot be in the DIP pool—the addresses referenced in the inboundbe symmetrical.

21. An overlapping address space is when the IP address range in two networks are partially or completely the same.

22. The range of addresses in a DIP pool must be in the same subnet as the tunnel interface, but the pool must not includor VIP addresses that might also be in that subnet. For security zone interfaces, you can also define an extended IP adin a different subnet from that of the interface IP address. For more information, see “Extended Interface and DIP” on

Page 205: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

191

nslation on bidirectional VPN

specifically reference a VPN ents in the policy that

u first create the policy, and roxy ID for a VPN tunnel that is ID, not the proxy ID derived

er-defined proxy ID. With a PN tunnel in a policy. Instead, ute to that destination points to nnel is not directly associated stination address, and service, nfiguration also allows you to le Phase 2 SA.)

ith overlapping address spaces:

uple of local address, remote address,

tunnel.2.20.2.1/24

.2.5 (to 10.1.1.5)2.2 � 10.20.2.2

creen-BInternal Address

Space10.1.1.0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

When you want the NetScreen device to perform source and destination address tratraffic through the same tunnel, you have two choices:

• You can define a proxy ID23 for a policy-based VPN configuration. When youtunnel in a policy, the NetScreen device derives a proxy ID from the componreferences that tunnel. The NetScreen device derives the proxy ID when yoeach time the device reboots thereafter. However, if you manually define a preferenced in a policy, the NetScreen device applies the user-defined proxyfrom the policy.

• You can use a route-based VPN tunnel configuration, which must have a usroute-based VPN tunnel configuration, you do not specifically reference a Vthe policy controls access (permit or deny) to a particular destination. The roa tunnel interface that in turn is bound to a VPN tunnel. Because the VPN tuwith a policy from which it can derive a proxy ID from the source address, deyou must manually define a proxy ID for it. (Note that a route-based VPN cocreate multiple policies that make use of a single VPN tunnel; that is, a sing

Consider the addresses in following illustration of a VPN tunnel between two sites w

23. A proxy ID is a kind of agreement between IKE peers to permit traffic through a tunnel if the traffic matches a specified tand service.

tunnel.110.10.1.1/24 10

10.10.1.2 � 10.10.1.2 DIP10.10.1.5 (to 10.1.1.5) MIP

MIP 10.20DIP 10.20.

NetScreen-A NetSVPN TunnelInternal Address

Space10.1.1.0/24

Addresses in Policies

Page 206: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

192

s, as they do in policy-based roxy IDs:

or inbound. When NetScreen-A tiations and produce Phase 1 und proxy ID for NetScreen-A,

0.20.2.2/32 to 10.10.1.5/32 peers use the existing Phase 1 A. The resulting proxy IDs are r NetScreen-B. There are two uire different proxy IDs.

oxy IDs with addresses whose the tunnel:

d VPN traffic between the two d the MIP 10.10.1.5. Likewise, IP 10.20.2.524. The above

en-BRemote Service

10.10.1.2/32 Any10.10.1.5/32 Any

-Bte Service0/24 Any

/0 Any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

If the NetScreen devices in the previous illustration derive proxy IDs from the policieVPN configurations, then the inbound and outbound policies produce the following p

As you can see, there are two proxy IDs: one for outbound VPN traffic and another ffirst sends traffic from 10.10.1.2/32 to 10.20.2.5/32, the two peers perform IKE negoand Phase 2 security associations (SAs). The Phase 2 SA results in the above outboand the inbound proxy ID for NetScreen-B.

If NetScreen-B then sends traffic to NetScreen-A, the policy lookup for traffic from 1indicates that there is no active Phase 2 SA for such a proxy ID. Therefore, the two SA (assuming that its lifetime has not yet expired) to negotiate a different Phase 2 Sshown above as the inbound proxy ID for NetScreen-A and the outbound proxy ID foPhase 2 SAs—two VPN tunnels—because the addresses are asymmetrical and req

To create just one tunnel for bidirectional VPN traffic, you can define the following prscope includes both the translated source and destination addresses at each end of

The above proxy IDs encompass addresses appearing in both inbound and outbounsites. The address 10.10.1.0/24 includes both the DIP pool 10.10.1.2 – 10.10.1.2 anthe address 10.20.2.0/24 includes both the DIP pool 10.20.2.2 – 10.20.2.2 and the M

NetScreen-A NetScreLocal Remote Service Local

Outbound 10.10.1.2/32 10.20.2.5/32 Any Inbound 10.20.2.5/32Inbound 10.10.1.5/32 10.20.2.2/32 Any Outbound 10.20.2.2/32

NetScreen-A NetScreenLocal Remote Service Local Remo

10.10.1.0/24 10.20.2.0/24 Any 10.20.2.0/24 10.10.1.or

0.0.0.0/0 0.0.0.0/0 Any 0.0.0.0/0 0.0.0.0

24. The address 0.0.0.0/0 includes all IP addresses, and thus the addresses of the DIP pool and MIP.

Page 207: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

193

ddress for NetScreen-B, and D also apply to traffic sent from nel—is all that is required for

ress spaces when the ubnets from each other, the type. If you want to use more ust be in the same subnet.

site and “NetScreen-B” at a ddresses in the 10.1.1.0/24 on outbound VPN traffic and rmit all addresses in the e branch office site to reach an

utoKey IKE, preshared key nd Phase 2 proposals. (For

IP address 1.1.1.1/24 and is remote IKE gateway.

IP address 2.2.2.2/24 and is s remote IKE gateway.

10.1.1.1/24. All zones on both

on (NAT-src and NAT-dst), see

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

proxy IDs are symmetrical; that is, the local address for NetScreen-A is the remote avice versa. If NetScreen-A sends traffic to NetScreen-B, the Phase 2 SA and proxy INetScreen-B to NetScreen-A. Thus, a single Phase 2 SA—that is, a single VPN tunbidirectional traffic between the two sites.

To create one VPN tunnel for bidirectional traffic between sites with overlapping addaddresses for NAT-src and NAT-dst configured on the same device are in different sproxy ID for the tunnel must be (local IP) 0.0.0.0/0 – (remote IP) 0.0.0.0/0 – service restrictive addresses in the proxy ID, then the addresses for NAT-src and NAT-dst m

Example: Tunnel Interface with NAT-Src and NAT-DstIn this example, you configure a VPN tunnel between “NetScreen-A” at a corporate branch office. The address space for the VPN end entities overlaps; they both use asubnet. To overcome this conflict, you use NAT-src to translate the source address NAT-dst to translate the destination address on inbound VPN traffic. The policies pecorporate LAN to reach an FTP server at the branch site, and for all addresses at thFTP server at the corporate site.

The tunnel configurations at both ends of the tunnel use the following parameters: A(“netscreen1”), and the security level predefined as “Compatible” for both Phase 1 adetails about these proposals, see “Tunnel Negotiation” on page 11.)

The outgoing interface on NetScreen-A at the corporate site is ethernet3, which hasbound to the Untrust zone. NetScreen-B at the branch office uses this address as its

The outgoing interface on NetScreen-B at the branch office is ethernet3 , which hasbound to the Untrust zone. NetScreen-A at the corporate site uses this address as it

The Trust zone interface on both NetScreen devices is ethernet1 and has IP addressNetScreen devices are in the trust-vr routing domain.

Note: For more information about source and destination network address translatiVolume 7, �Address Translation�.

Page 208: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

194

k Apply :

network B10.1.1.0/24

serverB

serverB10.1.1.5

4

.1.2.1.1.5

erver A.

etwork B

Trust Zone

of the zones NetScreen-B at ch1 office.

B

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (NetScreen-A)

1. Interfaces

Network > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

network A10.1.1.0/24

network A

serverA10.1.1.5

Tunnel.1 10.10.1.1/24 Tunnel.1 10.20.1.1/2

DIP 6 10.20.1.2 � 10.20NAT-Dst 10.20.1.5 �> 10

VPN Tunnel�vpn1�

Users at network A can access server B. Users at network B can access sAll traffic flows through the VPN tunnel between the two sites.

serverA n

Internet

DIP 5 10.10.1.2 � 10.10.1.2NAT-Dst 10.10.1.5 �> 10.1.1.5

NetScreen-A NetScreen-B

Topology of the zones configured on NetScreen-A at

the corporate office.

Trust Zone

Untrust Zone

Untrust Zone

Topology configured on

the bran

AA B

Gateway1.1.1.250

Gateway2.2.2.250

NetScreen-A NetScreen-B

Page 209: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

195

k OK:

K:

and then click OK :

.1.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.10.1.1/24

2. DIPNetwork > Interfaces > Edit (for tunnel.1) > DIP > New: Enter the following,

ID: 5

IP Address Range: (select), 10.10.1.2 ~ 10.10

Port Translation: (select)

In the same subnet as the interface IP or its s

Page 210: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

196

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: virtualA

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.5/32

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: branch1

IP Address/Domain Name:

IP/Netmask: (select), 10.20.1.2/32

Zone: Untrust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: serverB

IP Address/Domain Name:

IP/Netmask: (select), 10.20.1.5/32

Zone: Untrust

Page 211: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

197

(select)

e: 2.2.2.2

ttings, and then click Return to on page:

l.1

4

/24

ase they are in the same zone.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: branch1

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet325

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.10.1.0/2

Remote IP / Netmask: 10.20.1.0

Service: ANY

25. The outgoing interface does not have to be in the same zone to which the tunnel interface is bound, although in this c

Page 212: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

198

then click OK:

then click OK:

OK :

ttings, and then click Return to e:

0.1.2)/X-late

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.20.1.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet1/2(trust-vr)

Gateway IP Address: 1.1.1.250

6. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), corp

Destination Address:

Address Book Entry: (select), serverB

Service: FTP

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:Source Translation: (select)

DIP On: 5 (10.10.1.2–10.1

Page 213: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

199

OK :

ttings, and then click Return to e:

ct)

0.1.1.5

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), branch1

Destination Address:

Address Book Entry: (select), virtualA

Service: FTP

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP: (select), 1

Map to Port: (clear)

Page 214: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

200

k Apply :

k OK:

K:

and then click OK :

.1.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (NetScreen-B)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.20.1.1/24

2. DIPNetwork > Interfaces > Edit (for tunnel.1) > DIP > New: Enter the following,

ID: 6

IP Address Range: (select), 10.20.1.2 ~ 10.20

Port Translation: (select)

In the same subnet as the interface IP or its s

Page 215: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

201

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: branch1

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: virtualB

IP Address/Domain Name:

IP/Netmask: (select), 10.20.1.5/32

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.2/32

Zone: Untrust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: serverA

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.5/32

Zone: Untrust

Page 216: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

202

(select)

e: 1.1.1.1

ttings, and then click Return to on page:

l.1

4

/24

ase they are in the same zone.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet326

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.20.1.0/2

Remote IP / Netmask: 10.10.1.0

Service: ANY

26. The outgoing interface does not have to be in the same zone to which the tunnel interface is bound, although in this c

Page 217: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

203

then click OK:

then click OK:

OK :

ttings, and then click Return to e:

0.1.2)/X-late

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.10.1.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet1/2(trust-vr)

Gateway IP Address: 2.2.2.250

6. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), corp

Destination Address:

Address Book Entry: (select), serverA

Service: FTP

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:Source Translation: (select)

DIP on: 6 (10.20.1.2–10.2

Page 218: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

204

OK :

ttings, and then click Return to e:

ct)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), corp

Destination Address:

Address Book Entry: (select), virtualB

Service: FTP

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP: 10.1.1.5

Map to Port: (clear)

Page 219: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

205

ce ethernet327 preshare

.20.1.0/24 any

ase they are in the same zone.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-A)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip 10.10.1.1/24

2. DIPset interface tunnel.1 dip 5 10.10.1.2 10.10.1.2

3. Addressesset address trust corp 10.1.1.0/24set address trust virtualA 10.10.1.5/32set address untrust branch1 10.20.1.2/32set address untrust serverB 10.20.1.5/32

4. VPNset ike gateway branch1 address 2.2.2.2 outgoing-interfa

netscreen1 sec-level compatibleset vpn vpn1 gateway branch1 sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 10.10.1.0/24 remote-ip 10

27. The outgoing interface does not have to be in the same zone to which the tunnel interface is bound, although in this c

Page 220: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

206

.1 gateway 1.1.1.250

t src dip-id 5 permitp nat dst ip 10.1.1.5

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. Routesset vrouter trust-vr route 10.20.1.0/24 interface tunnelset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policiesset policy top from trust to untrust corp serverB ftp naset policy top from untrust to trust branch1 virtualA ft

permitsave

CLI (NetScreen-B)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip 10.20.1.1/24

2. DIPset interface tunnel.1 dip 6 10.20.1.2 10.20.1.2

3. Addressesset address trust branch1 10.1.1.0/24set address trust virtualB 10.20.1.5/32set address untrust corp 10.10.1.2/32set address untrust serverA 10.10.1.5/32

Page 221: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs VPN Sites with Overlapping Addresses

207

ethernet328 preshare

.10.1.0/24 any

.1 gateway 2.2.2.250

nat src dip-id 6

at dst ip 10.1.1.5

ase they are in the same zone.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen1 sec-level compatibleset vpn vpn1 gateway corp sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 10.20.1.0/24 remote-ip 10

5. Routesset vrouter trust-vr route 10.10.1.0/24 interface tunnelset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policiesset policy top from trust to untrust branch1 serverA ftp

permitset policy top from untrust to trust corp virtualB ftp n

permitsave

28. The outgoing interface does not have to be in the same zone to which the tunnel interface is bound, although in this c

Page 222: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

208

o IP addresses and are N termination point. In place of s, they have IP addresses and nnel uses the V1-Untrust zone e, the VPN tunnel can use any

seven layers, in which layer 2 is the

arent mode supports only t Mode� on page 2 -104.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

TRANSPARENT MODE VPNWhen the NetScreen device interfaces are in Transparent mode (that is, they have noperating at Layer 2 in the OSI model29), you can use the VLAN1 IP address as a VPan outgoing interface, as used when the interfaces are in Route or NAT mode (that iare operating at Layer 3), a VPN tunnel references an outgoing zone. By default, a tuas its outgoing zone. If you have multiple interfaces bound to the same outgoing zonone of them.

29. The OSI model is a networking industry standard model of network protocol architecture. The OSI model consists of data link layer and layer 3 is the network layer.

Note: At the time of this release, a NetScreen device whose interfaces are in Transppolicy-based VPNs. For more information about Transparent mode, see �Transparen

Page 223: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

209

tScreen devices with interfaces

tunnel are as follows:

arent mode. The interfaces of er device can be in Route or

NetScreen-Brface: ethernet1, 0.0.0.0/0anagement for the local admin)

rface: ethernet3, 0.0.0.0/0

trative traffic and the VLAN1 address to

IP Address: 2.2.2.2/24Manage IP: 2.2.2.3

lan: 2.2.2.0/24 in V1-Trustlan: 1.1.1.0/24 in V1-Untrust

.1, preshared key h1p8A24nG5, security: compatible

security: compatible

-> peer_lan, any service, vpn1 -> local_lan, any service, vpn1

IP Address: 2.2.2.250

.0/0, use VLAN1 interfaceto gateway 2.2.2.250

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Transparent Mode, Policy-Based AutoKey IKE VPNIn this example, you set up a policy-based AutoKey IKE VPN tunnel between two Neoperating in Transparent mode.

The key elements of the configuration for the NetScreen devices at both ends of the

Note: It is not necessary that the interfaces of both NetScreen devices be in Transpthe device at one end of the tunnel can be in Transparent mode and those of the othNAT mode.

Configuration Elements NetScreen-AV1-Trust Zone Interface: ethernet1, 0.0.0.0/0

(enable management for the local admin)Inte

(enable m

V1-Untrust Zone Interface: ethernet3, 0.0.0.0/0 Inte

VLAN1 Interface IP Address: 1.1.1.1/24Manage IP: 1.1.1.2*

* You can separate administrative from VPN traffic by using the manage IP address to receive administerminate VPN traffic.

Addresses local_lan: 1.1.1.0/24 in V1-Trustpeer_lan: 2.2.2.0/24 in V1-Untrust

local_peer_

IKE gateway gw1, 2.2.2.2, preshared key h1p8A24nG5, security: compatible

gw1, 1.1.1

VPN tunnel security: compatible

Policies local_lan -> peer_lan, any service, vpn1peer_lan -> local_lan, any service, vpn1

local_lanpeer_lan

External Router IP Address: 1.1.1.250

Route 0.0.0.0/0, use VLAN1 interfaceto gateway 1.1.1.250

0.0.0

Page 224: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

210

aces are in Transparent mode

e layer-2 security zones.

oks for the V1-Trust and

t zone.

nd then click OK :

een device to delete any routes ce through the WebUI, your bnet as the new address. After workstation so that it is in the our workstation to a subnet

so that a local admin in the V1-Trust V1-Trust zone interfaces, you cannot ility on these interfaces through a

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Configuring a policy-based AutoKey IKE tunnel for a NetScreen device whose interfinvolves the following steps:

1. Remove any IP addresses from the physical interfaces, and bind them to th

2. Assign an IP address and manage IP address to the VLAN1 interface.

3. Enter the IP addresses for the local and remote endpoints in the address boV1-Untrust zones.

4. Configure the VPN tunnel and designate its outgoing zone as the V1-Untrus

5. Enter a default route to the external router in the trust-vr.

6. Set up policies for VPN traffic to pass between each site.

WebUI (NetScreen-A)

1. Interfaces

Network > Interfaces > Edit (for the VLAN1 interface): Enter the following, a

IP Address/Netmask: 1.1.1.1/24

Manage IP: 1.1.1.2

Management Services: WebUI, Telnet, Ping30

Note: Moving the VLAN1 IP address to a different subnet causes the NetScrinvolving the previous VLAN1 interface. When configuring a NetScreen deviworkstation must reach the first VLAN1 address and then be in the same suchanging the VLAN1 address, you must then change the IP address of yoursame subnet as the new VLAN1 address. You might also have to relocate yphysically adjacent to the NetScreen device.

30. You enable the management options for WebUI, Telnet, and Ping on both the V1-Trust zone and the VLAN1 interfacezone can reach the VLAN1 manage IP address. If management via the WebUI is not already enabled on VLAN1 and thereach the NetScreen device through the WebUI to make these settings. Instead, you must first set WebUI manageabconsole connection.

Page 225: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

211

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Management Services: WebUI, Telnet

Other Services: Ping

Select the following, and then click OK:

Zone Name: V1-Trust

IP Address/Netmask: 0.0.0.0/0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: V1-Untrust

IP Address/Netmask: 0.0.0.0/0

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: local_lan

IP Address/Domain Name:

IP/Netmask: (select), 1.1.1.0/24

Zone: V1-Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: peer_lan

IP Address/Domain Name:

IP/Netmask: (select), 2.2.2.0/24

Zone: V1-Untrust

Page 226: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

212

click OK:

tname: 2.2.2.2

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: gw1

Security Level: Compatible

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key: h1p8A24nG5

Outgoing Zone: V1-Untrust

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway:

Predefined: (select), gw1

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: VLAN1 (VLAN)

Gateway IP Address: 1.1.1.250

Page 227: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

213

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), local_lan

Destination Address:

Address Book Entry: (select), peer_lan

Service: ANY

Action: Tunnel

Tunnel VPN: vpn1

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 228: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

214

nd then click OK :

k Apply :

k OK:

een device to delete any routes ce through the WebUI, your bnet as the new address. After workstation so that it is in the our workstation to a subnet

NetScreen device through the WebUI ction.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (NetScreen-B)

1. Interfaces

Network > Interfaces > Edit (for the VLAN1 interface): Enter the following, a

IP Address/Netmask: 2.2.2.2/24

Manage IP: 2.2.2.3

Management Services: WebUI31, Telnet, Ping

Network > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Management Services: WebUI, Telnet

Other Services: Ping

Select the following, and then click OK:

Zone Name: V1-Trust

IP Address/Netmask: 0.0.0.0/0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: V1-Untrust

IP Address/Netmask: 0.0.0.0/0

Note: Moving the VLAN1 IP address to a different subnet causes the NetScrinvolving the previous VLAN1 interface. When configuring a NetScreen deviworkstation must reach the first VLAN1 address and then be in the same suchanging the VLAN1 address, you must then change the IP address of yoursame subnet as the new VLAN1 address. You might also have to relocate yphysically adjacent to the NetScreen device.

31. If management via the WebUI is not already enabled on VLAN1 and the V1-Trust zone interfaces, you cannot reach theto make these settings. Instead, you must first set WebUI manageability on these interfaces through a console conne

Page 229: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

215

click OK:

tname: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: local_lan

IP Address/Domain Name:

IP/Netmask: (select), 2.2.2.0/24

Zone: V1-Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: peer_lan

IP Address/Domain Name:

IP/Netmask: (select), 1.1.1.0/24

Zone: V1-Untrust

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: gw1

Security Level: Compatible

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key: h1p8A24nG5

Outgoing Zone: V1-Untrust

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway:

Predefined: (select), gw1

Page 230: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

216

then click OK:

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: VLAN1 (VLAN)

Gateway IP Address: 2.2.2.250

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), local_lan

Destination Address:

Address Book Entry: (select), peer_lan

Service: ANY

Action: Tunnel

Tunnel VPN: vpn1

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 231: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

217

ce v1-untrust preshare

so that a local admin in the V1-Trust

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-A)

1. Interfaces and Zonesunset interface ethernet1 ipunset interface ethernet1 zoneset interface ethernet1 zone v1-trustset zone v1-trust manage webset zone v1-trust manage telnetset zone v1-trust manage ping32

unset interface ethernet3 ipunset interface ethernet3 zoneset interface ethernet3 zone v1-untrust

set interface vlan1 ip 1.1.1.1/24set interface vlan1 manage-ip 1.1.1.2set interface vlan1 manage webset interface vlan1 manage telnetset interface vlan1 manage ping

2. Addressesset address v1-trust local_lan 1.1.1.0/24set address v1-untrust peer_lan 2.2.2.0/24

3. VPNset ike gateway gw1 address 2.2.2.2 main outgoing-interfa

h1p8A24nG5 sec-level compatibleset vpn vpn1 gateway gw1 sec-level compatible

32. You enable the management options for WebUI, Telnet, and Ping on both the V1-Trust zone and the VLAN1 interfacezone can reach the VLAN1 manage IP address.

Page 232: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

218

eway 1.1.1.250

r_lan any tunnel vpn

l_lan any tunnel vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface vlan1 gat

5. Policiesset policy top from v1-trust to v1-untrust local_lan pee

vpn1set policy top from v1-untrust to v1-trust peer_lan loca

vpn1save

CLI (NetScreen-B)

1. Interfaces and Zonesunset interface ethernet1 ipunset interface ethernet1 zoneset interface ethernet1 zone v1-trustset zone v1-trust manage

unset interface ethernet3 ipunset interface ethernet3 zoneset interface ethernet3 zone v1-untrust

set interface vlan1 ip 2.2.2.2/24set interface vlan1 manage-ip 2.2.2.3set interface vlan1 manage

2. Addressesset address v1-trust local_lan 2.2.2.0/24set address v1-untrust peer_lan 1.1.1.0/24

Page 233: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

219

ce v1-untrust preshare

eway 2.2.2.250

r_lan any tunnel vpn

l_lan any tunnel vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNset ike gateway gw1 address 1.1.1.1 main outgoing-interfa

h1p8A24nG5 sec-level compatibleset vpn vpn1 gateway gw1 sec-level compatible

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface vlan1 gat

5. Policiesset policy top from v1-trust to v1-untrust local_lan pee

vpn1set policy top from v1-untrust to v1-trust peer_lan loca

vpn1 save

Page 234: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 4 Site-to-Site VPNs Transparent Mode VPN

220

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 235: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

5

221

Chapter 5

reen device that has a static IP NetScreen device with a

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Dialup VPNs

NetScreen devices can support dialup VPN connections. You can configure a NetScaddress to secure an IPSec tunnel with a NetScreen-Remote client or with another dynamic IP address.

This chapter offers examples of the following dialup VPN concepts:

• “Dialup VPNs” on page 222

– “Example: Policy-Based Dialup VPN, AutoKey IKE” on page 223

– “Example: Route-Based Dialup VPN, Dynamic Peer” on page 232

– “Example: Policy-Based Dialup VPN, Dynamic Peer” on page 243

– “Example: Bidirectional Dialup VPN Policies” on page 254

• “Group IKE ID” on page 261

– “Example: Group IKE ID (Certificates)” on page 267

– “Example: Group IKE ID (Preshared Keys)” on page 276

• “Shared IKE ID” on page 283

– “Example: Shared IKE ID (Preshared Keys)” on page 284

Page 236: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

222

o a VPN dialup group for which allows you to define one user ticularly timesaving when there r individually.

mote does, you can also create s). You can configure a a NetScreen-Remote client or

amic peer client1, you can r client can support a virtual table entry to that virtual a route-based VPN tunnel

roups� on page 8 -76. For more

�IPSec�. For guidance when

xcept that the internal IP

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

DIALUP VPNSYou can configure tunnels for VPN dialup users on a per-user basis or form users intyou need only configure one tunnel. You can also create a group IKE ID user, whichwhose IKE ID is used as part of the IKE IDs of dialup IKE users. This approach is parare large groups of dialup users because you do not have to configure each IKE use

If the dialup client can support a virtual internal IP address, which the NetScreen-Rea dynamic peer dialup VPN, AutoKey IKE tunnel (with a preshared key or certificateNetScreen security gateway with a static IP address to secure an IPSec tunnel with with another NetScreen device with a dynamic IP address.

You can configure policy-based VPN tunnels for VPN dialup users. For a dialup dynconfigure either a policy-based or route-based VPN. Because a dialup dynamic peeinternal IP address, which the NetScreen-Remote does, you can configure a routinginternal address via a designated tunnel interface. Doing so allows you to configure between the NetScreen device and that peer.

Note: For more information on creating IKE user groups, see �IKE Users and User Ginformation about the Group IKE ID feature, see �Group IKE ID� on page 261.

Note: For background information about the available VPN options, see Chapter 1, choosing among the various options, see Chapter 3, �VPN Guidelines�.

1. A dialup dynamic peer client is a dialup client that supports a virtual internal IP address.

Note: The dialup dynamic peer is nearly identical to the Site-to-Site dynamic peer eaddress for the dialup client is a virtual address.

Page 237: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

223

tificates (one at each end of the nd the UNIX server. The tunnel

certificates requires the

e trust-vr routing domain.

the UNIX from the dialup user.

n about certificates, see “Certificates

Trust Zone

rporate OfficeTrust Zonenet1, 10.1.1.1/24

UNIX Server10.1.1.5

LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Policy-Based Dialup VPN, AutoKey IKEIn this example, an AutoKey IKE tunnel using either a preshared key or a pair of certunnel2) provides the secure communication channel between the IKE user Wendy aagain uses ESP with 3DES encryption and SHA-1 authentication.

Setting up the AutoKey IKE tunnel using AutoKey IKE with either a preshared key orfollowing configuration at the corporate site:

1. Configure interfaces for the Trust and Untrust zones, both of which are in th

2. Enter the address of the UNIX server in the Trust zone address book.

3. Define Wendy as an IKE user.

4. Configure the remote gateway and AutoKey IKE VPN.

5. Set up a default route.

6. Create a policy from the Untrust zone to the Trust zone permitting access to

2. The preshared key is h1p8A24nG5. It is assumed that both participants already have certificates. For more informatioand CRLs” on page 29.

Internet

VPN Tunnel

Untrust Zone

Remote User: WendyNetScreen-Remote Co

ether

Outgoing InterfaceUntrust Zone

ethernet3, 1.1.1.1/24Gateway 1.1.1.250

Page 238: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

224

ready have RSA certificates the U-FQDN Certificates and CRLs” on page r pre-g2-3des-sha for the

d “Compatible” set of proposals

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The preshared key is h1p8A24nG5. This example assumes that both participants alissued by Verisign, and that the local certificate on the NetScreen-Remote contains [email protected]. (For information about obtaining and loading certificates, see “29.) For the Phase 1 and 2 security levels, you specify one Phase 1 proposal—eithepreshared key method or rsa-g2-3des-sha for certificates—and select the predefinefor Phase 2.

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: UNIX

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.5/32

Zone: Trust

Page 239: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

225

click OK:

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. UserObjects > Users > Local > New: Enter the following, and then click OK :

User Name: Wendy

Status: Enable (select)

IKE User: (select)

Simple Identity: (select)

IKE Identity: [email protected]

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: Wendy_NSR

Security Level: Custom

Remote Gateway Type:

Dialup User: (select), User: Wendy

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

Page 240: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

226

ttings, and then click Return to age:

Security Level):

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

(or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Wendy_UNIX

Security Level: Compatible

Remote Gateway:

Predefined: (select), Wendy_NSR

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Page 241: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

227

OK :

ar)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), UNIX

Service: ANY

Action: Tunnel

Tunnel VPN: Wendy_UNIX

Modify matching bidirectional VPN policy: (cle

Position at Top: (select)

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressset address trust unix 10.1.1.5/32

3. Userset user wendy ike-id u-fqdn [email protected]

Page 242: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

228

ng-interface ethernet3

e

ng-interface ethernet3

e

gateway 1.1.1.250

any tunnel vpn

a-cert .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPN

Preshared Key

set ike gateway wendy_nsr dialup wendy aggressive outgoipreshare h1p8A24nG5 proposal pre-g2-3des-sha

set vpn wendy_unix gateway wendy_nsr sec-level compatibl

(or)

Certificates

set ike gateway wendy_nsr dialup wendy aggressive outgoiproposal rsa-g2-3des-sha

set ike gateway wendy_nsr cert peer-ca 13

set ike gateway wendy_nsr cert peer-cert-type x509-sigset vpn wendy_unix gateway wendy_nsr sec-level compatibl

5. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policyset policy top from untrust to trust “Dial-Up VPN” unix

wendy_unixsave

3. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get pki x509 list c

Page 243: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

229

on that appears.

lect)

onnection policy.

.

able Perfect Forward Secrecy

en the PLUS symbol to the left icy further.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type UNIX next to the new connection ic

3. Configure the connection options:

Connection Security: Secure

Remote Party Identity and Addressing:

ID Type: IP Address, 10.1.1.5

Protocol: All

Connect using Secure Gateway Tunnel: (se

ID Type: IP Address, 1.1.1.1

4. Click the PLUS symbol, located to the left of the UNIX icon, to expand the c

5. Click My Identity : Do either of the following:

Click Pre-shared Key > Enter Key : Type h1p8A24nG5, and then click OK

ID Type: (select E-mail Address), and type [email protected].

(or)

Select a certificate from the Select Certificate drop-down list.

ID Type: (select E-mail Address)4

6. Click the Security Policy icon, and select Aggressive Mode , and clear En(PFS) .

7. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

4. The e-mail address from the certificate appears in the identifier field automatically.

Page 244: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

230

ication Method and Algorithms:

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Authentication Method: RSA Signatures

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

9. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

10. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

11. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

Page 245: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

231

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

12. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

13. Click File > Save Changes.

Page 246: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

232

mote to the Untrust zone ntrust zone interface has a l IP address and a static e peer’s internal IP address for

nd to an appropriate tunnel.

an then originate from either

When he attempts to do so, he ugh the tunnel.

tScreen administrator adds a affic through the tunnel to

DMZ Zone

orate Officethernet22.2.1/24

Mail Server1.2.2.5

IDENT Request

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Route-Based Dialup VPN, Dynamic PeerIn this example, a VPN tunnel securely connects the user behind the NetScreen-Reinterface of the NetScreen device protecting the mail server in the DMZ zone. The Ustatic IP address. The NetScreen-Remote client has a dynamically assigned externa(virtual) internal IP address. The administrator of the NetScreen device must know thtwo the following two purposes:

• The admin can use it in policies.

• The admin can create a route linking the address with a tunnel interface bou

After the NetScreen-Remote client establishes the tunnel, traffic through the tunnel cend. All zones on the NetScreen device are in the trust-vr routing domain.

In this example, Phil wants to get his e-mail from the mail server at the company site.is authenticated by the mail server program, which sends him an IDENT request thro

Note: The mail server can send the IDENT request through the tunnel only if the Necustom service for it (TCP, port 113) and sets up an outgoing policy allowing that tr10.10.10.1.

Internet

VPN Tunnel

Untrust Zone

Remote User: PhilNetScreen-Remote

Corpe1.

Outgoing Interfaceethernet31.1.1.1/24

External IP AddressDynamic

Internal IP Address10.10.10.1

SMTPRequest

Tunnel InterfaceTunnel.1

Gateway 1.1.1.250

Page 247: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

233

e RSA certificates issued by N [email protected]. (For

page 29.) For the Phase 1 and preshared key method or osals for Phase 2.

k OK:

k OK:

K :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The preshared key is h1p8A24nG5. It is assumed that both participants already havVerisign, and that the local certificate on the NetScreen-Remote contains the U-FQDinformation about obtaining and loading certificates, see “Certificates and CRLs” on 2 security levels, you specify one Phase 1 proposal—either pre-g2-3des-sha for thersa-g2-3des-sha for certificates—and select the predefined “Compatible” set of prop

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet2): Enter the following, and then clic

Zone Name: DMZ

Static IP: (select this option when present)

IP Address/Netmask: 1.2.2.1/24

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Unnumbered: (select)

Interface: ethernet3 (trust-vr)

Page 248: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

234

:

services, and then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Mail Server

IP Address/Domain Name:

IP/Netmask: (select), 1.2.2.5/32

Zone: DMZ

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Phil

IP Address/Domain Name:

IP/Netmask: (select), 10.10.10.1/32

Zone: Untrust

3. ServicesObjects > Services > Custom > New: Enter the following, and then click OK

Service Name: Ident

Service Timeout:

Use protocol default: (select)

Transport Protocol: TCP (select)

Source Port: Low 1, High 65535

Destination Port: Low 113, High 113

Objects > Services > Group > New: Enter the following, move the following

Group Name: Remote_Mail

Group Members << Available Members:

IdentMAILPOP3

Page 249: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

235

click OK:

juniper.net

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Phil

Security Level: Custom

Remote Gateway Type:

Dynamic IP Address: (select), Peer ID: pm@

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

(or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Page 250: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

236

ttings, and then click Return to on page:

t), tunnel.1

.1/32

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: corp_Phil

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Phil

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface: (selec

Proxy-ID: (select)

Local IP / Netmask: 1.2.2.5/32

Remote IP / Netmask: 10.10.10

Service: Any

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Page 251: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

237

then click OK:

OK:

OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 10.10.10.1/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

6. PoliciesPolicies > (From: Untrust, To: DMZ) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Phil

Destination Address:

Address Book Entry: (select), Mail Server

Service: Remote_Mail

Action: Permit

Position at Top: (select)

Policies > (From: DMZ, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Mail Server

Destination Address:

Address Book Entry: (select), Phil

Service: Remote_Mail

Action: Permit

Position at Top: (select)

Page 252: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

238

113-113

e outgoing-interface ha

10.10.10.1/32 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet2 zone dmzset interface ethernet2 ip 1.2.2.1/24

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

2. Addressesset address dmz “Mail Server” 1.2.2.5/32set address untrust phil 10.10.10.1/32

3. Servicesset service ident protocol tcp src-port 1-65535 dst-portset group service remote_mailset group service remote_mail add identset group service remote_mail add mailset group service remote_mail add pop3

4. VPN

Preshared Key

set ike gateway to_phil dynamic [email protected] aggressivethernet3 preshare h1p8A24nG5 proposal pre-g2-3des-s

set vpn corp_phil gateway to_phil sec-level compatibleset vpn corp_phil bind interface tunnel.1set vpn corp_phil proxy-id local-ip 1.2.2.5/32 remote-ip

(or)

Page 253: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

239

e outgoing-interface

10.10.10.1/32 any

gateway 1.1.1.250l.1

mote_mail permitmote_mail permit

a-cert .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

set ike gateway to_phil dynamic [email protected] aggressivethernet3 proposal rsa-g2-3des-sha

set ike gateway to_phil cert peer-ca 15

set ike gateway to_phil cert peer-cert-type x509-sigset vpn corp_phil gateway to_phil sec-level compatibleset vpn corp_phil bind interface tunnel.1set vpn corp_phil proxy-id local-ip 1.2.2.5/32 remote-ip

5. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.10.10.1/32 interface tunne

6. Policiesset policy top from dmz to untrust “Mail Server” phil reset policy top from untrust to dmz phil “Mail Server” resave

5. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get pki x509 list c

Page 254: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

240

nternal Network Address

nection icon that appears.

lect)

nnection policy.

able Perfect Forward Secrecy

p8A24nG5, and then click OK .

address “[email protected]” from

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote

1. Click Options > Global Policy Settings, and select the Allow to Specify Icheck box.

2. Options > Secure > Specified Connections.

3. Click the Add a new connection button, and type Mail next to the new con

4. Configure the connection options:

Connection Security: Secure

Remote Party Identity and Addressing:

ID Type: IP Address, 1.2.2.5

Protocol: All

Connect using Secure Gateway Tunnel: (se

ID Type: IP Address, 1.1.1.1

5. Click the PLUS symbol, located to the left of the unix icon, to expand the co

6. Click the Security Policy icon, and select Aggressive Mode , and clear En(PFS) .

7. Click My Identity and do either of the following:

Click Pre-shared Key > Enter Key: Type h1

ID Type: E-mail Address; [email protected]

Internal Network IP Address: 10.10.10.1

(or)

Select the certificate that contains the e-mail the Select Certificate drop-down list.

ID Type: E-mail Address; [email protected]

Internal Network IP Address: 10.10.10.1

Page 255: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

241

en the PLUS symbol to the left icy further.

ication Method and Algorithms:

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

9. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Authentication Method: RSA Signatures

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

10. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

11. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

12. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

Page 256: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

242

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

13. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

14. Click File > Save Changes.

Page 257: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

243

mote to the Untrust zone ntrust zone interface has a l IP address and a static e client’s internal IP address so that source. After the

ate from either end.

When he attempts to do so, he ugh the tunnel.

tScreen administrator adds a affic through the tunnel to

DMZ Zone

orporate OfficeDMZ Zone

ernet2, 1.2.2.1/24Mail Server

1.2.2.5

IDENTRequest

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Policy-Based Dialup VPN, Dynamic PeerIn this example, a VPN tunnel securely connects the user behind the NetScreen-Reinterface of the NetScreen device protecting the mail server in the DMZ zone. The Ustatic IP address. The NetScreen-Remote client has a dynamically assigned externa(virtual) internal IP address. The administrator of the NetScreen device must know ththat he can add it to the Untrust address book for use in policies to tunnel traffic fromNetScreen-Remote client establishes the tunnel, traffic through the tunnel can origin

In this example, Phil wants to get his e-mail from the mail server at the company site.is authenticated by the mail server program, which sends him an IDENT request thro

Note: The mail server can send the IDENT request through the tunnel only if the Necustom service for it (TCP, port 113) and sets up an outgoing policy allowing that tr10.10.10.1.

Internet

VPN Tunnel

Untrust Zone

Remote User: PhilNetScreen-Remote C

eth

Outgoing InterfaceUntrust Zone

ethernet3, 1.1.1.1/24Gateway 1.1.1.250

External IP AddressDynamic

Internal IP Address10.10.10.1

SMTPRequest

Page 258: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

244

ve RSA certificates issued by N [email protected]. (For more

page 29.) For the Phase 1 and preshared key method or osals for Phase 2.

k OK:

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The preshared key is h1p8A24nG5. This example assumes that both participants haVerisign, and that the local certificate on the NetScreen-Remote contains the U-FQDinformation about obtaining and loading certificates, see “Certificates and CRLs” on 2 security levels, you specify one Phase 1 proposal—either pre-g2-3des-sha for thersa-g2-3des-sha for certificates—and select the predefined “Compatible” set of prop

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet2): Enter the following, and then clic

Zone Name: DMZ

Static IP: (select this option when present)

IP Address/Netmask: 1.2.2.1/24

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Mail Server

IP Address/Domain Name:

IP/Netmask: (select), 1.2.2.5/32

Zone: DMZ

Page 259: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

245

:

services, and then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Phil

IP Address/Domain Name:

IP/Netmask: (select), 10.10.10.1/32

Zone: Untrust

3. ServicesObjects > Services > Custom > New: Enter the following, and then click OK

Service Name: Ident

Service Timeout:

Use protocol default: (select)

Transport Protocol: TCP (select)

Source Port: Low 1, High 65535

Destination Port: Low 113, High 113

Objects > Services > Group > New: Enter the following, move the following

Group Name: Remote_Mail

Group Members << Available Members:

IdentMAILPOP3

Page 260: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

246

click OK:

juniper.net

ttings, and then click Return to age:

Security Level):

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: To_Phil

Security Level: Custom

Remote Gateway Type:

Dynamic IP Address: (select), Peer ID: pm@

Preshared Key

Preshared Key: h1p8A24nG5

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

(Or)

Certificates

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Page 261: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

247

then click OK:

OK:

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: corp_Phil

Security Level: Compatible

Remote Gateway:

Predefined: (select), To_Phil

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

6. PoliciesPolicies > (From: Untrust, To: DMZ) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Phil

Destination Address:

Address Book Entry: (select), Mail Server

Service: Remote_Mail

Action: Tunnel

VPN Tunnel: corp_Phil

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 262: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

248

113-113

e outgoing-interface ha

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet2 zone dmzset interface ethernet2 ip 1.2.2.1/24

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressesset address dmz “mail server” 1.2.2.5/32set address untrust phil 10.10.10.1/32

3. Servicesset service ident protocol tcp src-port 1-65535 dst-portset group service remote_mailset group service remote_mail add identset group service remote_mail add mailset group service remote_mail add pop3

4. VPN

Preshared Key

set ike gateway to_phil dynamic [email protected] aggressivethernet3 preshare h1p8A24nG5 proposal pre-g2-3des-s

set vpn corp_phil gateway to_phil sec-level compatible

(or)

Page 263: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

249

e outgoing-interface

gateway 1.1.1.250

mote_mail tunnel vpn

mote_mail tunnel vpn

a-cert .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Certificates

set ike gateway to_phil dynamic [email protected] aggressivethernet3 proposal rsa-g2-3des-sha

set ike gateway to_phil cert peer-ca 16

set ike gateway to_phil cert peer-cert-type x509-sigset vpn corp_phil gateway to_phil sec-level compatible

5. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policiesset policy top from untrust to dmz phil “mail server” re

corp_philset policy top from dmz to untrust “mail server” phil re

corp_philsave

6. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get pki x509 list c

Page 264: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

250

rnal Network Address.

n that appears.

lect)

nnection policy.

able Perfect Forward Secrecy

p8A24nG5, and then click OK .

address “[email protected]

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote1. Click Options > Global Policy Settings , and select Allow to Specify Inte

2. Options > Secure > Specified Connections.

3. Click Add a new connection , and type Mail next to the new connection ico

4. Configure the connection options:

Connection Security: Secure

Remote Party Identity and Addressing:

ID Type: IP Address, 1.2.2.5

Protocol: All

Connect using Secure Gateway Tunnel: (se

ID Type: IP Address, 1.1.1.1

5. Click the PLUS symbol, located to the left of the unix icon, to expand the co

6. Click the Security Policy icon, and select Aggressive Mode , and clear En(PFS) .

7. Click My Identity and do either of the following:

Click Pre-shared Key > Enter Key: Type h1

Internal Network IP Address: 10.10.10.1

ID Type: E-mail Address; [email protected]

(or)

Select the certificate that contains the e-mail from the Select Certificate drop-down list.

Internal Network IP Address: 10.10.10.1

ID Type: E-mail Address; [email protected]

Page 265: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

251

en the PLUS symbol to the left icy further.

ication Method and Algorithms:

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

9. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Authentication Method: RSA Signatures

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

10. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

11. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

12. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Page 266: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

252

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Hash Alg: SHA-1

Encapsulation: Tunnel

13. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

14. Click File > Save Changes.

Page 267: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

253

ilar functionality as a dynamic creen device admin must know destination address when er” on page 243). With a dialup l address space of the dialup p VPN” as the source address

inate from the LAN end of the irst initiate the tunnel creation.) vices on the incoming and

alup VPN users might overlap. 0.2.2.0/24. If that happens, the

the VPN referenced in the first N to user A appears first in the

ers A and B to user A.

n any other policy—whether or pplies the first policy that ort number, destination port d address superseding another nal dialup VPN policy lower in

al policies referencing a dialup

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Bidirectional Policies for Dialup VPN UsersYou can create bidirectional policies for dialup VPNs. This configuration provides simpeer VPN configuration. However, with a dynamic peer VPN configuration, the NetSthe internal IP address space of the dialup user, so that the admin can use it as the configuring an outgoing policy (see “Example: Policy-Based Dialup VPN, Dynamic PeVPN user configuration, the admin at the LAN site does not need to know the internauser. The NetScreen device protecting the LAN uses the predefined address “Dial-Uin the incoming policy and the destination in the outgoing policy.

The ability to create bidirectional policies for a dialup VPN tunnel allows traffic to origVPN connection after the connection has been established. (The remote end must fNote that unlike a dialup dynamic peer VPN tunnel, this feature requires that the seroutgoing policies be identical.

Be mindful that the internal address space of two or more concurrently connected diFor example, dialup users A and B might both have an internal IP address space of 1NetScreen device sends all outbound VPN traffic to both user A and user B throughpolicy it finds in the policy list. For example, if the outbound policy referencing the VPpolicy list, then the NetScreen device sends all outbound VPN traffic intended for us

Similarly, the internal address of a dialup user might happen to overlap an address inot that other policy references a VPN tunnel. If that occurs, the NetScreen device amatches the basic traffic attributes of source address, destination address, source pnumber, service. To avoid a bidirectional dialup VPN policy with a dynamically derivepolicy with a static address, Juniper Networks recommends positioning the bidirectiothe policy list.

Note: NetScreen does not support service groups and address groups in bidirectionVPN configuration.

Page 268: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

254

nnel named VPN_dial for IKE l pre-g2-3des-sha , with the r Phase 2 negotiations.

one to reach corporate servers te from either end of the tunnel.

e. The Untrust zone interface is ter at 1.1.1.250.

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Bidirectional Dialup VPN PoliciesIn this example, you configure bidirectional policies for a dialup AutoKey IKE VPN tuuser dialup-j with IKE ID [email protected] . For Phase 1 negotiations, you use the proposapreshared key Jf11d7uU. You select the predefined “Compatible” set of proposals fo

The IKE user initiates a VPN connection to the NetScreen device from the Untrust zin the Trust zone. After the IKE user establishes the VPN connection, traffic can initia

The Trust zone interface is ethernet1, has IP address 10.1.1.1/24, and is in NAT modethernet3 and has IP address 1.1.1.1/24. The default route points to the external rou

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Page 269: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

255

click OK:

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. ObjectsObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: trust_net

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Users > Local > New: Enter the following, and then click OK :

User Name: dialup-j

Status: Enable

IKE User: (select)

Simple Identity: (select); [email protected]

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: dialup1

Security Level: Custom

Remote Gateway Type:

Dialup User: (select); dialup-j

Preshared Key: Jf11d7uU

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom pre-g2-3des-sha

Mode (Initiator): Aggressive

Page 270: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

256

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN_dial

Security Level: Compatible

Remote Gateway:

Create a Simple Gateway: (select)

Gateway Name: dialup1

Type:

Dialup User: (select); dialup-j

Preshared Key: Jf11d7uU

Security Level: Compatible

Outgoing Interface: ethernet3

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet1

Gateway IP Address: 1.1.1.250

Page 271: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

257

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), trust_net

Service: ANY

Action: Tunnel

VPN Tunnel: VPN_dial

Modify matching bidirectional VPN policy: (se

Page 272: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

258

ng-interface ethernet3

gateway 1.1.1.250

any tunnel vpn

any tunnel vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Objectsset address trust trust_net 10.1.1.0/24set user dialup-j ike-id u-fqdn [email protected]

3. VPNset ike gateway dialup1 dialup dialup-j aggressive outgoi

preshare Jf11d7uU proposal pre-g2-3des-sha set vpn VPN_dial gateway dialup1 sec-level compatible

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy from untrust to trust “Dial-Up VPN” trust_net

VPN_dialset policy from trust to untrust trust_net “Dial-Up VPN”

VPN_dialsave

Page 273: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

259

on that appears.

lect)

onnection policy.

able Perfect Forward Secrecy

en the PLUS symbol to the left icy further.

ication Method and Algorithms:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type Corp next to the new connection ic

3. Configure the connection options:

Connection Security: Secure

Remote Party Identity and Addressing

ID Type: IP Subnet

Subnet: 10.1.1.0

Mask: 255.255.255.0

Protocol: All

Connect using Secure Gateway Tunnel: (se

ID Type: IP Address, 1.1.1.1

4. Click the PLUS symbol, located to the left of the UNIX icon, to expand the c

5. Click My Identity : Do either of the following:

Click Pre-shared Key > Enter Key : Type Jf11d7uU , and then click OK.

ID Type: (select E-mail Address), and type [email protected].

6. Click the Security Policy icon, and select Aggressive Mode , and clear En(PFS) .

7. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

8. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Page 274: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Dialup VPNs

260

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Authentication Method: RSA Signatures

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

9. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

10. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

11. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

12. Click Key Exchange (Phase 2) > Create New Proposal : Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

13. Click File > Save Changes.

Page 275: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

261

might have hundreds of users, ers, it is impractical to create a

for multiple users. The group the distinguished name (dn) or E ID and preshared key on the

e maximum number of nt sessions cannot exceed the allowed on the NetScreen

vice first extracts and uses the group IKE ID user group. If the or a partial IKE ID match

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

GROUP IKE IDSome organizations have many dialup VPN users. For example, a sales departmentmany of whom require secure dialup communication when off site. With so many usseparate user definition, dialup VPN configuration, and policy for each one.

To avoid this difficulty, the Group IKE ID method makes one user definition availableIKE ID user definition applies to all users having certificates with specified values in to all users whose full IKE ID and preshared key on their VPN client match a partial IKNetScreen device.

You add a single group IKE ID user to an IKE dialup VPN user group and specify thconcurrent connections that that group supports. The maximum number of concurremaximum number of allowed Phase 1 SAs or the maximum number of VPN tunnelsplatform.

Note: When a dialup IKE user connects to the NetScreen device, the NetScreen defull IKE ID to search its peer gateway records in case the user does not belong to afull IKE ID search produces no matching entry, the NetScreen device then checks fbetween the incoming embedded IKE ID and a configured group IKE ID user.

Page 276: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

262

group of dialup IKE users ice uses a single group IKE ID VPN tunnel to a NetScreen distinguished name elements rofile on the NetScreen device.

roup IKE ID UserN1-DN IKE ID Typertial IKE ID: ou=eng

cate the user, NetScreen compares lement of the distinguished name ated with the dialup user group with onding element in the certificate used for the IKE ID payload ing the initial Phase 1 packet.

ialup User Group

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Group IKE ID with CertificatesGroup IKE ID with certificates is a technique for performing IKE authentication for a without configuring a separate user profile for each one. Instead, the NetScreen devuser profile that contains a partial IKE ID. A dialup IKE user can successfully build adevice if the VPN configuration on his VPN client specifies a certificate that containsthat match those configured as the partial IKE ID definition in the group IKE ID user p

Full IKE ID(distinguished name)

CertificateDN:

cn=aliceou=eng-------------------- "

"

!

GASPa

To authentia specific e(dn) associthe correspand the dn accompany

D

Note: Because the distinguished name in Carol�s certificate does not include ou=eng , NetScreen rejects the connection request.

Dialup IKE Users

Group IKE ID with Certificates

CertificateDN:

cn=bobou=eng--------------------

CertificateDN:

cn=carolou=sales--------------------

Page 277: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

263

,o=netscreen), and specify how

up.

user group, that the Phase 1 ending on the type of certificate

nformation as defined in the

Phase 1 negotiations, specify e for the local IKE ID type.

elements that match the partial o the NetScreen device. For n device accepts Phase 1 ished name. The maximum upon the maximum number of

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

You can set up group IKE ID with certificates as follows:

On the NetScreen Device:

1. Create a new group IKE ID user with a partial IKE identity (such as ou=salesmany dialup users can use the group IKE ID profile to log on.

2. Assign the new group IKE ID user to a dialup user group7, and name the gro

3. In the dialup AutoKey IKE VPN configuration, specify the name of the dialupnegotiations be in Aggressive mode, and that certificates (RSA or DSA, deploaded on the dialup VPN clients) be used for authentication.

4. Create a policy permitting inbound traffic via the specified dialup VPN.

On the VPN Client:

1. Obtain and load a certificate whose distinguished name contains the same ipartial IKE ID on the NetScreen device.

2. Configure a VPN tunnel to the NetScreen device using Aggressive mode forthe certificate that you have previously loaded, and select Distinguished Nam

Thereafter, each individual dialup IKE user with a certificate with distinguished nameIKE ID defined in the group IKE ID user profile can successfully build a VPN tunnel texample, if the group IKE ID user has IKE ID OU=sales,O=netscreen, the NetScreenegotiations from any user with a certificate containing those elements in its distingunumber of such dialup IKE users that can connect to the NetScreen device dependsconcurrent sessions that you specify in the group IKE ID user profile.

7. You can put only one group IKE ID user in an IKE user group.

Page 278: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

264

Notation, version 1, tion is a string of values, which

s one of two types:

e dialup IKE user’s ASN1-DN he wildcard ID type supports

ou=eng,ou=sw”). The ordering

he dialup IKE user’s ASN1-DN ntity fields. The container ID

u=sw,ou=screenos”). The be identical.

wildcard” or “container” and le, “c=us,st=ca,cn=jrogers”). tinguishedName]. Include the

d:ountry

State

ocality

Organization

Organizational Unit

Common Name

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Wildcard and Container ASN1-DN IKE ID TypesWhen you define the IKE ID for a group IKE user, you must use the Abstract Syntaxdistinguished name (ASN1-DN) as the IKE ID type of identity configuration. This notais frequently, though not always, ordered from general to specific. For example:

When configuring the group IKE ID user, you must specify the peer’s ASN1-DN ID a

• Wildcard: NetScreen authenticates a dialup IKE user’s ID if the values in thidentity fields match those in the group IKE user’s ASN1-DN identity fields. Tonly one value per identity field (for example, “ou=eng” or “ou=sw”, but not “of the identity fields in the two ASN1-DN strings is inconsequential.

• Container: NetScreen authenticates a dialup IKE user’s ID if the values in tidentity fields exactly match the values in the group IKE user’s ASN1-DN idetype supports multiple entries for each identity field (for example, “ou=eng,oordering of the values in the identity fields of the two ASN1-DN strings must

When configuring an ASN1-DN ID for a remote IKE user, specify the type as either “define the ASN1-DN ID that you expect to receive in the peer’s certificate (for exampWhen configuring an ASN1-DN ID for a local IKE ID, use the following keyword: [Disbrackets and spell it exactly as shown.

C=usLegen

C = C

ST =

L = L

O =

OU =

CN =

ST=ca

L=sunnyvale

O=juniper

OU=sales

CN=joe

General

Specific

ASN1-DN: C=us,ST=ca,L=sunnyvale,O=juniper,OU=sales,CN=joe

Page 279: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

265

to match values in the group string is inconsequential. For

een,ST=ca,C=us

h the order of values in the two

E=

C=us

ST=

L=

=juniper

OU=

CN=

E User�s wildcard 1-DN IKE ID

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Wildcard ASN1-DN IKE ID

A wildcard ASN1-DN requires values in the remote peer’s distinguished name IKE IDIKE user’s partial ASN1-DN IKE ID. The sequencing of these values in the ASN1-DNexample, if the dialup IKE user’s ID and the group IKE user’s ID are as follows

• Dialup IKE user’s full ASN1-DN IKE ID: CN=christine,OU=finance,O=netscr

• Group IKE user’s partial ASN1-DN IKE ID: C=us,O=netscreen

then a wildcard ASN1-DN IKE ID successfully matches the two IKE IDs, even thougIDs is different.

E=

CN=christine

OU=finance

O=juniper

L=

ST=ca

C=us

O

Dialup IKE User�s ASN1-DN IKE ID

Group IKASN

"Authentication

The dialup IKE user�s ASN1-DN contains the values specified in the group IKE user�s ASN1-DN. The order of the values does not matter.

Page 280: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

266

ach identity field. NetScreen tch the values in the group IKE l in both the dialup IKE user’s ntical.

E=

C=us

ST=

L=

O=juniper

kt,OU=dom,OU=west

CN=

IKE User�s container ASN1-DN IKE ID

E=

C=us

ST=

L=

O=juniper

kt,OU=dom,OU=west

CN=

IKE User�s container ASN1-DN IKE ID

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Container ASN1-DN IKE ID

A container ASN1-DN ID allows the group IKE user’s ID to have multiple entries in eauthenticates a dialup IKE user if the dialup user’s ID contains values that exactly mauser’s ID. Unlike the wildcard type, the order of the ASN1-DN fields must be identicaand group IKE user’s IDs and the order of multiple values in those fields must be ide

The second dialup IKE user�s ASN1-DN contains exact matches of the group IKE user�s ASN1-DN. However, the order of the multiple entries in the OU ID field is not identical.

OU=m

Dialup IKE User�s ASN1-DN IKE ID

Group

"Authentication

The first dialup IKE user�s ASN1-DN contains exact matches of the group IKE user�s ASN1-DN. The order of the multiple entries in the OU ID field is also identical.

E=

C=us

ST=ca

L= sf

O=juniper

OU=mkt,OU=dom,OU=west

CN=yuki

OU=m

Dialup IKE User�s ASN1-DN IKE ID

Group

Authentication

E=

C=us

ST=ca

L= la

O=juniper

OU=mkt,OU=west,OU=dom

CN=joe

!

Page 281: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

267

nfigure it to accept up to 10 O=netscreen and ser group office_1 .

name (dn) in a certificate for a

,CN=a2010002,CN=ns500,

and the user uses the

es-sha for certificates—and

to reach the Web server Web1. ed.

/24

web110.1.1.5

Trust Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Group IKE ID (Certificates)In this example, you create a new group IKE ID user definition named User1. You coPhase 1 negotiations concurrently from VPN clients with RSA certificates containingOU=marketing. The certificate authority (CA) is Verisign. You name the dialup IKE u

The dialup IKE users send a distinguished name as their IKE ID. The distinguished dialup IKE user in this group might appear as the following concatenated string:

C=us,ST=ca,L=sunnyvale,O=netscreen,OU=marketing,CN=michael zhangCN=4085557800,CN=rsa-key,CN=10.10.5.44

Because the values O=netscreen and OU=marketing appear in the peer’s certificatedistinguished name as its IKE ID type, the NetScreen device authenticates the user.

For the Phase 1 and 2 security levels, you specify one Phase 1 proposal—rsa-g2-3dselect the predefined “Compatible” set of proposals for Phase 2.

You configure a dialup VPN and a policy permitting HTTP traffic via the VPN tunnel The configuration of the remote VPN client (using NetScreen-Remote) is also includ

Outgoing InterfaceUntrust Zone

eth3, 1.1.1.1/24

Trust Zoneeth1, 10.1.1.1

NAT Mode

Dialup User with IKE ID:

o=juniperou=marketing

gateway 1.1.1.250

Untrust Zone

VPN Tunnel

Group IKE ID User ProfileUser Name: User1

User Group: office_1Distinguished Name:

o=juniperou=marketing

Page 282: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

268

k OK:

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: web1

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.5/32

Zone: Trust

3. UsersObjects > Users > Local > New: Enter the following, then click OK :

User Name: User1

Status Enable: (select)

Page 283: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

269

ld, do the following, and then

er from the Available Members

click OK:

select), Group: office_1

ttings, and then click Return to age:

Security Level):

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IKE User: (select)

Number of Multiple Logins with same ID: 10

Use Distinguished Name For ID: (select)

OU: marketing

Organization: juniper

Objects > User Groups > Local > New: Type office_1 in the Group Name fieclick OK :

Select User1 and use the << button to move hcolumn to the Group Members column.

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: Corp_GW

Security Level: Custom

Remote Gateway Type: Dialup User Group: (

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Custom

Phase 1 Proposal (For Custom rsa-g2-3des-sha

Mode (Initiator): Aggressive

Preferred Certificate (optional):

Peer CA: Verisign

Peer Type: X509-SIG

Page 284: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

270

GW

then click OK :

OK:

ar)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: Corp_VPN

Security Level: Compatible

Remote Gateway: Predefined: (select), Corp_

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), web1

Service: HTTP

Action: Tunnel

Tunnel VPN: Corp_VPN

Modify matching bidirectional VPN policy: (cle

Position at Top: (select)

Page 285: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

271

eting share-limit 10

ng-interface ethernet3

gateway 1.1.1.250

ttp tunnel vpn Corp_VPN

a-cert .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressset address trust web1 10.1.1.5/32

3. Usersset user User1 ike-id asn1-dn wildcard o=juniper,ou=markset user-group office_1 user User1

4. VPNset ike gateway Corp_GW dialup office_1 aggressive outgoi

proposal rsa-g2-3des-shaset ike gateway Corp_GW cert peer-ca 18

set ike gateway Corp_GW cert peer-cert-type x509-sigset vpn Corp_VPN gateway Corp_GW sec-level compatible

5. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policyset policy top from untrust to trust “Dial-Up VPN” web1 hsave

8. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get pki x509 list c

Page 286: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

272

on that appears.

he Tab key, and type 80 .lect)

onnection policy.

as elements in its distinguished

e drop-down list.

Perfect Forward Secrecy

en the PLUS symbol to the left icy further.

ion and Data Integrity

ation on loading certificates on the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type web1 next to the new connection ic

3. Configure the connection options:Connection Security: SecureRemote Party Identity and Addressing

ID Type: IP Address, 10.1.1.5Protocol: Highlight All, type HTTP, press tConnect using Secure Gateway Tunnel: (seID Type: IP Address, 1.1.1.1

4. Click the PLUS symbol, located to the left of the web1 icon, to expand the c

5. Click My Identity : Select the certificate that has o=netscreen,ou=marketing name from the Select Certificate drop-down list9.

ID Type: Select Distinguished Name from th

6. Click the Security Policy icon, select Aggressive Mode , and clear Enable(PFS) .

7. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

8. Click Authentication (Phase 1) > Proposal 1: Select the following EncryptAlgorithms:

Authentication Method: RSA SignaturesEncrypt Alg: Triple DESHash Alg: SHA-1Key Group: Diffie-Hellman Group 2

9. This example assumes that you have already loaded a suitable certificate on the NetScreen-Remote client. For informNetScreen-Remote, refer to NetScreen-Remote documentation.

Page 287: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

273

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

9. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

10. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

11. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

12. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

13. Click File > Save Changes.

Page 288: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

274

or a group of dialup IKE users ice uses a single group IKE ID a VPN tunnel to a NetScreen

f the rightmost part of the user’s

an be either an e-mail address

Group IKE ID Userartial IKE ID: eng.ns.comred Key Seed Value: N11wWd2

generates a preshared key on the IKE user sends his full IKE ID.

ared key for each IKE user = key seed value x full IKE ID.)

compares its generated key with red key accompanying the initial cket to authenticate the user.

Dialup User Group

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Group IKE ID with Preshared KeysGroup IKE ID with preshared keys is a technique for performing IKE authentication fwithout configuring a separate user profile for each one. Instead, the NetScreen devuser profile, which contains a partial IKE ID. A dialup IKE user can successfully builddevice if the VPN configuration on his VPN client has the correct preshared key and ifull IKE ID matches the group IKE ID user profile’s partial IKE ID.

The IKE ID type that you can use for the Group IKE ID with Preshared Key feature cor a fully qualified domain name (FQDN).

Full IKE ID +

Preshared Key

alice.eng.ns.com+

011fg3322eda837c

bob.eng.ns.com+

bba7e22561c5da82

carol.ns.com+

834a2bbd32adc4e9

"

"

!

PPresha

NetScreenfly when an

(The preshpreshared

NetScreenthe preshaPhase 1 pa

Note: Because the IKE ID for Carol is not carol.eng.ns.com , NetScreen rejects the connection request.

Dialup IKE Users

Group IKE ID with Preshared Keys

Page 289: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

275

net), and specify how many

gateway (such as road1),

hared key using the preshared

Phase 1 negotiations and enter

whose full IKE ID contains a IKE ID user has IKE identity egotiations in Aggressive mode [email protected]. How many ecified in the group IKE ID user

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

You can set up group IKE ID with preshared keys as follows:

On the NetScreen Device:

1. Create a new group IKE ID user with a partial IKE identity (such as juniper.dialup users can use the group IKE ID profile to log on.

2. Assign the new group IKE ID user to a dialup user group.

3. In the dialup AutoKey IKE VPN configuration, assign a name for the remotespecify the dialup user group, and enter a preshared key seed value.

4. Use the following CLI command to generate an individual dialup user’s preskey seed value and the full user IKE ID (such as [email protected])

exec ike preshare-gen name_str usr_name_str(for example) exec ike preshare-gen road1 [email protected]

5. Record the preshared key for use when configuring the remote VPN client.

On the VPN Client:

Configure a VPN tunnel to the NetScreen device using Aggressive mode for the preshared key that you previously generated on the NetScreen device.

Thereafter, the NetScreen device can successfully authenticate each individual usersection that matches the partial group IKE ID user profile. For example, if the group juniper.net , any user with that domain name in his IKE ID can initiate Phase 1 IKE nwith the NetScreen device. For example: [email protected] , [email protected] and such users can log on depends upon a maximum number of concurrent sessions spprofile.

Page 290: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

276

to accept up to 10 Phase 1 ending with the string

E user group office_2 .

“Compatible”. All the security

k OK:

ne1.1.1/24de

web110.1.1.5

Trust Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Group IKE ID (Preshared Keys)In this example, you create a new group IKE ID user named User2 . You configure itnegotiations concurrently from VPN clients with preshared keys containing an IKE IDjuniper.net . The seed value for the preshared key is jk930k . You name the dialup IK

For both the Phase 1 and 2 negotiations, you select the security level predefined aszones are in the trust-vr routing domain.

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Outgoing InterfaceUntrust Zone

ethernet3, 1.1.1.1/24

Trust Zoethernet1, 10.

NAT Mo

Dialup User with IKE ID:

[email protected] gateway 1.1.1.250

Untrust Zone

VPN Tunnel

Group IKE ID User ProfileUser Name: User2

User Group: office_2Simple ID: juniper.net

Page 291: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

277

k OK:

eld, do the following, and then

him from the Available lumn.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressObjects > Addresses > List > New : Enter the following, and then click OK:

Address Name: web1

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.5/32

Zone: Trust

3. UsersObjects > Users > Local > New: Enter the following, then click OK:

User Name: User2

Status: Enable

IKE User: (select)

Number of Multiple Logins with same ID: 10

Simple Identity: (select)

IKE Identity: juniper.net

Objects > User Groups > Local > New: Type office_2 in the Group Name ficlick OK:

Select User2 and use the << button to move Members column to the Group Members co

Page 292: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

278

GW

then click OK :

OK:

ar)

a seed value from which the value when configuring an IKE

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPN

VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: Corp_VPN

Security Level: Compatible

Remote Gateway: Predefined: (select), Corp_

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), web1

Service: HTTP

Action: Tunnel

Tunnel VPN: Corp_VPN

Modify matching bidirectional VPN policy: (cle

Position at Top: (select)

Note: The WebUI allows you to enter only a value for a preshared key, notNetScreen device derives a preshared key. To enter a preshared key seedgateway, you must use the CLI.

Page 293: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

279

preshare jk930k

gateway 1.1.1.250

http tunnel vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressset address trust web1 10.1.1.5/32

3. Usersset user User2 ike-id u-fqdn juniper.net share-limit 10set user-group office_2 user User2

4. VPNset ike gateway Corp_GW dialup office_2 aggressive seed-

sec-level compatibleset vpn Corp_VPN gateway Corp_GW sec-level compatible

5. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

6. Policyset policy top from untrust to trust “Dial-Up VPN” web1

Corp_VPNsave

Page 294: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

280

:

ified in the configuration for the @juniper.net is

on that appears.

he Tab key, and type 80 .

lect)

onnection policy.

Perfect Forward Secrecy

n click the PLUS symbol to the policy further.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Obtaining the Preshared Key

You can only obtain the preshared key by using the following CLI command

exec ike preshare-gen name_str usr_name_strThe preshared key, based on the preshared key seed value jk930k (as specremote gateway named Corp_GW) and the full identity of individual user joe11ccce1d396f8f29ffa93d11257f691af96916f2 .

NetScreen-Remote Security Policy Editor

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type web1 next to the new connection ic

3. Configure the connection options:

Connection Security: Secure

Remote Party Identity and Addressing

ID Type: IP Address, 10.1.1.5

Protocol: Highlight All, type HTTP, press t

Connect using Secure Gateway Tunnel: (se

ID Type: IP Address, 1.1.1.1

4. Click the PLUS symbol, located to the left of the web1 icon, to expand the c

5. Click the Security Policy icon, select Aggressive Mode , and clear Enable(PFS) .

6. Click My Identity: Click Pre-shared Key > Enter Key : Type 11ccce1d396f8f29f fa93d11257f691af96916f2, and then click OK.

ID Type: (select E-mail Address), and type [email protected] .

7. Click the PLUS symbol, located to the left of the Security Policy icon, and theleft of Authentication (Phase 1) and Key Exchange (Phase 2) to expand the

Page 295: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

281

ion and Data Integrity

ing IPSec Protocols:

ing IPSec Protocols:

ing IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click Authentication (Phase 1) > Proposal 1: Select the following EncryptAlgorithms:

Authentication Method: Pre-Shared Key

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

9. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key

Encrypt Alg: Triple DES

Hash Alg: MD5

Key Group: Diffie-Hellman Group 2

10. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key

Encrypt Alg: DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

11. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key

Encrypt Alg: DES

Hash Alg: MD5

Key Group: Diffie-Hellman Group 2

Page 296: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Group IKE ID

282

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

12. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

13. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

14. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

15. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

16. Click File > Save Changes.

Page 297: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

283

rs. With this feature, the ID and preshared key. Thus, it figuration.

owing differences:

DN (fully-qualified domain

erate a preshared key for each

the group IKE ID to log on. For

gateway.

1 negotiations and enter the etScreen device authenticates

t by matching the IKE ID and reen device. If there is a match, login prompt to the user at the essfully logs on with the correct

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

SHARED IKE IDThe shared IKE ID feature facilitates the deployment of a large number of dialup useNetScreen device authenticates multiple dialup VPN users using a single group IKEprovides IPSec protection for large remote user groups through a common VPN con

This feature is similar to the Group IKE ID with pre-shared keys feature, with the foll

• With the group IKE ID feature, the IKE ID can be an e-mail address or an FQname). For this feature, the IKE ID must be an e-mail address.

• Instead of using the preshared key seed value and the full user IKE ID to genuser, you specify a single preshared key for all users in the group.

• You must use XAuth to authenticate the individual users.

To set up a shared IKE ID and preshared key on the NetScreen device:

1. Create a new group IKE ID user, and specify how many dialup users can usethis feature, use an e-mail address as the IKE ID.

2. Assign the new group IKE ID to a dialup user group.

3. In the dialup-to-LAN autokey IKE VPN configuration, create a shared IKE ID

4. Define the XAuth users and enable XAuth on the remote IKE gateway.

On the VPN Client:

Configure a VPN tunnel to the NetScreen device using Aggressive mode for Phase preshared key that you previously defined on the NetScreen device.Thereafter, the Neach remote user as follows:

During Phase 1 negotiations, the NetScreen device first authenticates the VPN clienpreshared key that the client sends with the IKE ID and preshared key on the NetScthen the NetScreen device uses XAuth to authenticate the individual user. It sends aremote site between Phase 1 and Phase 2 IKE negotiations. If the remote user succuser name and password, Phase 2 negotiations begin.

Page 298: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

284

ts up to 250 Phase 1 . You name the dialup IKE user

“Compatible”. All the security

k Apply :

1.1.1/24de

web110.1.1.5

Trust Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Shared IKE ID (Preshared Keys)In this example, you create a new group IKE ID user named Remote_Sales. It accepnegotiations concurrently from VPN clients with the same preshared key (abcd1234)group R_S. In addition, you configure two XAuth users, Joe and MIke.

For both the Phase 1 and 2 negotiations, you select the security level predefined aszones are in the trust-vr routing domain.

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Outgoing Interfaceethernet3, 1.1.1.1/24

ethernet1, 10.NAT Mo

Dialup User with IKE ID: [email protected]

XAuth password: 1234Untrust Zone

VPN Tunnels

Shared IKE ID User ProfileUser Name: Remote_Sales

User Group: R_SSimple ID: [email protected]

Dialup User with IKE ID: [email protected] password: 5678

Page 299: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

285

k OK:

0

do the following, and then click

to move him from the Available lumn.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: web1

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.5/32

Zone: Trust

3. UsersObjects > Users > Local > New: Enter the following, then click OK :

User Name: Remote_Sales

Status: Enable

IKE User: (select)

Number of Multiple Logins with same ID: 25

Simple Identity: (select)

IKE Identity: [email protected]

Objects > User Groups > Local > New: Type R_S in the Group Name field, OK:

Select Remote_sales and use the << buttonMembers column to the Group Members co

Page 300: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

286

click OK:

), R_S

k Return to return to the base

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Users > Local > New: Enter the following, then click OK :

User Name: Joe

Status: Enable

XAuth User: (select)

Password: 1234

Confirm Password: 1234

Objects > Users > Local > New: Enter the following, then click OK :

User Name: Mike

Status: Enable

XAuth User: (select)

Password: 5678

Confirm Password: 5678

4. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: sales_gateway

Security Level: Compatible (select)

Remote Gateway Type: Dialup Group (select

Preshared Key: abcd1234

Outgoing Interface: ethernet3

> Advanced: Enter the following, and then clicGateway configuration page:

Enable XAuth: (select)

Local Authentication: (select)

Allow Any: (select)

Page 301: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

287

gateway

ttings, and then click Return to on page:

un

then click OK :

OK:

ar)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: Sales_VPN

Security Level: Compatible

Remote Gateway: Predefined: (select) sales_

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Zone, Untrust-T

5. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), web1

Service: HTTP

Action: Tunnel

Tunnel VPN: Sales_VPN

Modify matching bidirectional VPN policy: (cle

Position at Top: (select)

Page 302: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

288

0

oing-interface

ible

0

tp tunnel vpn sales_vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressset address trust web1 10.1.1.5/32

3. Usersset user Remote_Sales ike-id [email protected] share-limit 25set user-group R_S user Remote_Salesset user Joe password 1234set user Joe type xauthset user Mike password 5678set user Mike type xauth

4. VPNset ike gateway sales_gateway dialup R_S aggressive outg

ethernet3 preshare abcd1234 sec-level compatibleset ike gateway sales_gateway xauthset vpn sales_vpn gateway sales_gateway sec-level compatset vpn sales_vpn bind zone untrust-tun

5. Routeset route 0.0.0.0/0 interface ethernet3 gateway 1.1.1.25

6. Policyset policy top from untrust to trust “Dial-Up VPN” web1 htsave

Page 303: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

289

on that appears.

ct)

onnection policy.

Perfect Forward Secrecy

d then click OK .

n click the PLUS symbol to the policy further.

ion and Data Integrity

nded Authentication

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor

This example shows the configuration for the user named Joe.

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type web1 next to the new connection ic

3. Configure the connection options:

Connection Security: Secure

Remote Party ID Type: IP Address

IP Address: 10.1.1.5

Connect using Secure Gateway Tunnel: (sele

ID Type: IP Address; 1.1.1.1

4. Click the PLUS symbol, located to the left of the web1 icon, to expand the c

5. Click the Security Policy icon, select Aggressive Mode , and clear Enable(PFS) .

6. Click My Identity: Click Pre-shared Key > Enter Key : Type abcd1234, an

ID Type: (select E-mail Address), and type [email protected] .

7. Click the PLUS symbol, located to the left of the Security Policy icon, and theleft of Authentication (Phase 1) and Key Exchange (Phase 2) to expand the

8. Click Authentication (Phase 1) > Proposal 1: Select the following EncryptAlgorithms:

Authentication Method: Pre-Shared Key; Exte

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

Page 304: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

290

ing IPSec Protocols:

nded Authentication

ing IPSec Protocols:

nded Authentication

ing IPSec Protocols:

nded Authentication

rotocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

9. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key; Exte

Encrypt Alg: Triple DES

Hash Alg: MD5

Key Group: Diffie-Hellman Group 2

10. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key; Exte

Encrypt Alg: DES

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

11. Click Authentication (Phase 1) > Create New Proposal : Select the follow

Authentication Method: Pre-Shared Key; Exte

Encrypt Alg: DES

Hash Alg: MD5

Key Group: Diffie-Hellman Group 2

12. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Tunnel

13. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Tunnel

Page 305: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

291

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

14. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Tunnel

15. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Tunnel

16. Click File > Save Changes.

Page 306: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 5 Dialup VPNs Shared IKE ID

292

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 307: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

6

293

alone and with IPSec support,

301

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Chapter 6

L2TP

This chapter provides an introduction to Layer 2 Tunneling Protocol (L2TP), its use and then some configuration examples for L2TP and L2TP-over-IPSec:

• “Introduction to L2TP” on page 294

• “Packet Encapsulation and Decapsulation” on page 298

• “L2TP Parameters” on page 300

– “Example: Configuring an IP Pool and L2TP Default Settings” on page

• “L2TP and L2TP-over-IPSec” on page 303

– “Example: Configuring L2TP” on page 304

– “Example: Configuring L2TP-over-IPSec” on page 310

– “Example: Bidirectional L2TP-over-IPSec” on page 323

Page 308: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Introduction to L2TP

294

l Point-to-Point Protocol (PPP) P sends PPP frames through a

NS at either another ISP or uter, but only to the LAC at the uration.)

lient by itself, can act as a LAC. nd-to-end tunneling. (This

CorporateLAN

ice

ork

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

INTRODUCTION TO L2TPLayer 2 Tunneling Protocol (L2TP) provides a way for a dial-up user to make a virtuaconnection to an L2TP network server (LNS), which can be a NetScreen device. L2Ttunnel between an L2TP access concentrator (LAC) and the LNS.

Originally, L2TP was designed so that a LAC residing at an ISP site tunneled to an Lcorporate site. The L2TP tunnel did not extend completely to the dial-up user’s compdial-up user’s local ISP. (This is sometimes referred to as a compulsory L2TP config

A NetScreen-Remote client on Windows 2000 or Windows NT, or a Windows 2000 cThe L2TP tunnel can extend directly to the dial-up user’s computer, thus providing eapproach is sometimes referred to as a voluntary L2TP configuration.)

Dial-upConnection

ISPInternet

L2TP Access Concentrator

(LAC)

Dial-up User

NetScreen Dev

L2TP NetwServer(LNS)

L2TP Tunnel(forwarding PPP sessions

from LAC to LNS)

Page 309: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Introduction to L2TP

295

reen device (LNS), it is the servers addresses, and r (RADIUS, SecurID, or LDAP).

SP, and a logical one from the NS assignments, and address, which becomes the

Device)

CorporateLAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Because the PPP link extends from the dial-up user across the Internet to the NetScNetScreen device, not the ISP, that assigns the client its IP address, DNS and WINSauthenticates the user, either from the local database or from an external auth serve

In fact, the client receives two IP addresses—one for its physical connection to the ILNS. When the client contacts its ISP, perhaps using PPP, the ISP makes IP and Dauthenticates the client. This allows users to connect to the Internet with a public IP outer IP address of the L2TP tunnel.

Internet

NetScreen-Remoteor Windows 2000

(LAC)ISP

NetScreen(LNS

L2TP Tunnel(forwarding PPP sessions

from LAC to LNS)

IP Address: 5.5.5.5DNS: 6.6.6.6, 7.7.7.7

ISPFirst, the ISP assigns the client a public IP address and DNS server addresses.

1

Page 310: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Introduction to L2TP

296

n device, the NetScreen device e from the set of private

he L2TP tunnel.

m the IP addresses in the

4

Corporate LAN10.1.1.0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Then, when the L2TP tunnel forwards the encapsulated PPP frames to the NetScreeassigns the client an IP address, and DNS and WINS settings. The IP address can baddresses not used on the Internet. This address becomes the inner IP address of t

Note: The IP addresses assigned to the L2TP client must be in a different subnet frocorporate LAN.

IP Address: 10.10.1.161DNS: 10.1.1.10, 1.2.2.10

WINS: 10.1.1.48, 10.1.1.49IP Address Pool

10.10.1.1 � 10.10.1.25

NetScreen Device(LNS)

Internet

Second, the NetScreen device�acting as an LNS�assigns the client a private (logical) IP address, and DNS and WINS server addresses.

2

Page 311: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Introduction to L2TP

297

s using certificates, and

ing certificates

dialup policy can be paired with

) and Challenge Handshake server (RADIUS, SecurID, or

ervers, and Windows Internet server

ystems

tIPSec key in the registry and change registry.) Click Start > Run: Type rs. Double-click ProhibitIPSec : Type an entry in the registry, see Microsoft

P. SecurID and LDAP servers

ith security zone interfaces in ith security zone interfaces in

TP-related CLI commands elicit

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The current version of ScreenOS provides the following L2TP support:

• L2TP tunnels originating from a host running Windows 20001

• Combination of L2TP and IPSec in transport mode (L2TP-over-IPSec)

– For NetScreen-Remote: L2TP-over-IPSec with Main mode negotiationAggressive mode using either a preshared key or certificates

– For Windows 2000: L2TP-over-IPSec with Main mode negotiations us

• Outgoing dialup policy for L2TP and L2TP-over-IPSec tunnels. An outgoing and incoming policy, to provide a bidirectional tunnel.

• User authentication using either the Password Authentication Protocol (PAPAuthentication Protocol (CHAP) from the local database or an external authLDAP)

• The assignment of dialup users’ IP address, Domain Name System (DNS) sNaming Service (WINS) servers from either the local database or a RADIUS

• L2TP tunnels and L2TP-over-IPSec tunnels for the root system and virtual s

1. By default, Windows 2000 performs L2TP-over-IPSec. To force it to use L2TP only, you must navigate to the Prohibi0 (L2TP-over-IPSec) to 1 (L2TP only). (Before performing this, Juniper Networks recommends that you backup yourregedit. Double-click HKEY_LOCAL_MACHINE > System > CurrentControlSet > Services > RasMan > Paramete1 in the Value data field, select Hexadecimal as the base value, and then click OK . Reboot. (If you do not find such WIndows documentation for information on how to create one.)

Note: The local database and RADIUS servers support both PAP and CHAsupport PAP only.

Note: To use L2TP, the NetScreen device must be operating at Layer 3, wNAT or Route mode. When the NetScreen device is operating at Layer 2, wTransparent mode, no L2TP-related material appears in the WebUI, and L2error messages.

Page 312: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Packet Encapsulation and Decapsulation

298

om the LAC to the LNS. Before of the encapsulation and

psulates the IP packet within a ialup user connects to the local

on between the dialup user and

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

PACKET ENCAPSULATION AND DECAPSULATIONL2TP employs encapsulation of packets as the means for transporting PPP frames frlooking at specific examples for setting up L2TP and L2TP-over-IPSec, an overviewdecapsulation involved in the L2TP process is presented.

EncapsulationWhen a dialup user on an IP network sends data over an L2TP tunnel, the LAC encaseries of layer 2 frames, layer 3 packets, and layer 4 segments. Assuming that the dISP over a PPP link, the encapsulation proceeds as follows:

1. The data is placed in an IP payload.

2. The IP packet is encapsulated in a PPP frame.

3. The PPP frame is encapsulated in an L2TP frame.

4. The L2TP frame is encapsulated in a UDP segment.

5. The UDP segment is encapsulated in an IP packet.

6. The IP packet is encapsulated in a PPP frame to make the physical connectithe ISP.

Page 313: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP Packet Encapsulation and Decapsulation

299

the nested contents proceed as

ress.

er reserved for L2TP.

2TP header to identify the

IP address.

r is removed and the data in the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

DecapsulationWhen the LAC initiates the PPP link to the ISP, the decapsulation and forwarding of follows:

1. The ISP completes the PPP link and assigns the user’s computer an IP addInside the PPP payload is an IP packet.

2. The ISP removes the PPP header and forwards the IP packet to the LNS.3. The LNS removes the IP header.

Inside the IP payload is a UDP segment specifying port 1701, the port numb4. The LNS removes the UDP header.

Inside the UDP payload is an L2TP frame.5. The LNS processes the L2TP frame, using the tunnel ID and call ID in the L

specific L2TP tunnel. The LNS then removes the L2TP header.Inside the L2TP payload is a PPP frame.

6. The LNS processes the PPP frame, assigning the user’s computer a logicalInside the PPP payload is an IP packet.

7. The LNS routes the IP packet to its ultimate destination, where the IP headeIP packet is extracted.

ISP

LNS

Page 314: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP Parameters

300

e from an ISP. These settings

dresses and assigns it to the he IP address pool; that is, in a cycle: 10.10.1.1 – 10.10.1.2 –

rovides these addresses for the

also provides these addresses

nter the user in the local

:

een device sends a challenge t, and the user encrypts his or servers support CHAP.

sword in the clear along with servers support PAP.

t fails, PAP.

that you configure on the L2TP fault command. You can also onfiguration page (Users > e user-specific L2TP settings

an be the same server you use

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

L2TP PARAMETERSThe LNS uses L2TP to provide the PPP settings for a dial-up user that typically comare as follows:

• IP address – The NetScreen device selects an address from a pool of IP addial-up user’s computer. The selection process operates cyclically through tpool from 10.10.1.1 to 10.10.1.3, the addresses are selected in the following10.10.1.3 – 10.10.1.1 – 10.10.1.2 …

• DNS primary and secondary server IP addresses – The NetScreen device pdial-up user’s computer to use.

• WINS primary and secondary server IP addresses – The NetScreen device for the dial-up user’s computer to use.

The LNS also authenticates the user through a user name and password. You can edatabase or in an external auth server (RADIUS, SecurID, or LDAP).

In addition, you can specify one of the following schemes for the PPP authentication

• Challenge Handshake Authentication Protocol (CHAP), in which the NetScr(encryption key) to the dial-up user after he or she makes a PPP link requesher login name and password with the key. The local database and RADIUS

• Password Authentication Protocol (PAP), which sends the dial-up user’s pasthe PPP link request. The local database and RADIUS, SecurID, and LDAP

• “ANY”, meaning that the NetScreen device negotiates CHAP, and then if tha

You can apply to dial-up users and dialup user groups the default L2TP parameters Default Configuration page (VPNs > L2TP > Default Settings) or with the set l2tp deapply L2TP parameters that you configure specifically for L2TP users on the User CUsers > Local > New) or with the set user name_str remote-settings command. Thsupersede the default L2TP settings.

Note: The RADIUS or SecurID server that you use for authenticating L2TP users cfor network users, or it can be a different server.

Page 315: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP Parameters

301

0 to 10.1.3.100. You specify device performs PPP

DNS 11.1.1.2

DNS 21.1.1.3nternet

Untrust Zone

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Configuring an IP Pool and L2TP Default SettingsIn this example, you define an IP address pool with addresses ranging from 10.1.3.4DNS server IP addresses 1.1.1.2 (primary) and 1.1.1.3 (secondary). The NetScreenauthentication using CHAP.

WebUI

1. IP Pool

Objects > IP Pools > New: Enter the following, and then click OK:

IP Pool Name: Sutro

Start IP: 10.1.3.40

End IP: 10.1.3.100

Note: You specify the auth server on a per-L2TP tunnel basis.

RADIUS10.1.1.245

L2TP IP Pool 10.1.3.40 � 10.1.3.100

I

Trust Zone

Note: The L2TP pool addresses must be in a different subnet from those in the Trust zone.

ethernet3,1.1.1.1/24

ethernet1,10.1.1.1/24

Page 316: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP Parameters

302

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. Default L2TP SettingsVPNs > L2TP > Default Settings: Enter the following, and then click Apply :

IP Pool Name: Sutro

PPP Authentication: CHAP

DNS Primary Server IP: 1.1.1.2

DNS Secondary Server IP: 1.1.1.3

WINS Primary Server IP: 0.0.0.0

WINS Secondary Server IP: 0.0.0.0

CLI

1. IP Poolset ippool sutro 10.1.3.40 10.1.3.100

2. Default L2TP Settingsset l2tp default ippool sutroset l2tp default ppp-auth chapset l2tp default dns1 1.1.1.2set l2tp default dns2 1.1.1.3save

Page 317: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

303

is not encrypted, and therefore f the local NetScreen device to ed in policies.

nel. Because L2TP assumes e encryption. This combination l and an IPSec tunnel with the s that the IPSec tunnel be in ation about transport mode

dows 2000 if you change the the footnote on page 297.)

of the following VPN clients:

rating system

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

L2TP AND L2TP-OVER-IPSECAlthough the dial-up user can be authenticated using CHAP or PAP, an L2TP tunnelis not a true VPN tunnel. The purpose of L2TP is simply to permit the administrator oassign IP addresses to remote dial-up users. These addresses can then be referenc

To encrypt an L2TP tunnel, you need to apply an encryption scheme to the L2TP tunthat the network between the LAC and the LNS is IP, you can employ IPSec to providis called L2TP-over-IPSec. L2TP-over-IPSec requires setting up both an L2TP tunnesame endpoints, and then linking them together in a policy. L2TP-over-IPSec requiretransport mode so that the tunnel endpoint addresses remain in the clear. (For informand tunnel mode, see “Modes” on page 4.)

You can create an L2TP tunnel between a NetScreen device and a host running WinWindows 2000 registry settings. (For instructions on how to change the registry, see

You can create an L2TP-over-IPSec tunnel between a NetScreen device and either

• A host running NetScreen-Remote on a Windows 2000 or Windows NT ope

• A host running Windows 2000 (without NetScreen-Remote)2

2. To provide authentication when using WIndows 2000 without the NetScreen-Remote, you must use certificates.

Page 318: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

304

igure an L2TP tunnel called unnel. The NetScreen device

to 10.10.2.1803.

n how to configure L2TP on the NetScreen device end of the

ing purposes.

CorporateNetwork

Trust Zone

1,24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Configuring L2TPIn this example, you create a dialup user group called “fs” (for “field-sales”) and conf“sales_corp,” using ethernet3 (Untrust zone) as the outgoing interface for the L2TP tapplies the following default L2TP tunnel settings to the dialup user group:

• The L2TP users are authenticated via the local database.

• PPP authentication uses CHAP.

• The range of addresses in the IP pool (named “global”) is from 10.10.2.100

• The DNS servers are 1.1.1.2 (primary) and 1.1.1.3 (secondary)

The remote L2TP clients are on Windows 2000 operating systems. For information oremote clients, refer to Windows 2000 documentation. Only the configuration for theL2TP tunnel is provided below.

3. The addresses in the L2TP IP pool must be in a different subnet than the addresses in the corporate network.

Note: An L2TP-only configuration is not secure. It is recommended only for debugg

Auth/L2TP Dialup Users Group: fs

Adam

Betty

Carol

DNS 1: 1.1.1.2DNS 2: 1.1.1.3

IP Pool: global10.10.2.100 �10.10.2.180

Internet

L2TP Tunnel: sales_corp

Untrust Zone

Outgoing Interfaceethernet3, 1.1.1.1/24

ethernet10.1.1.1/

Page 319: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

305

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. L2TP UsersObjects > Users > Local > New: Enter the following, and then click OK :

User Name: Adam

Status: Enable

L2TP User: (select)

User Password: AJbioJ15

Confirm Password: AJbioJ15

Objects > Users > Local > New: Enter the following, and then click OK :

User Name: Betty

Status: Enable

L2TP User: (select)

User Password: BviPsoJ1

Confirm Password: BviPsoJ1

Objects > Users > Local > New: Enter the following, and then click OK :

User Name: Carol

Status: Enable

L2TP User: (select)

User Password: Cs10kdD3

Confirm Password: Cs10kdD3

Page 320: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

306

the following, and then click

him from the Available lumn.

er from the Available Members

er from the Available Members

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. L2TP User GroupObjects > User Groups > Local > New: Type fs in the Group Name field, doOK:

Select Adam and use the << button to move Members column to the Group Members co

Select Betty and use the << button to move hcolumn to the Group Members column.

Select Carol and use the << button to move hcolumn to the Group Members column.

3. Default L2TP SettingsObjects > IP Pools > New: Enter the following, and then click OK:

IP Pool Name: global

Start IP: 10.10.2.100

End IP: 10.10.2.180

VPNs > L2TP > Default Settings: Enter the following, and then click OK:

IP Pool Name: global

PPP Authentication: CHAP

DNS Primary Server IP: 1.1.1.2

DNS Secondary Server IP: 1.1.1.3

WINS Primary Server IP: 0.0.0.0

WINS Secondary Server IP: 0.0.0.0

Page 321: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

307

computer acting as the LAC5.een the LAC and the LNS.

ystem. The System Properties dialog

ust modify the Windows 2000

.

t appears.

the word in the L2TP Tunnel

thentication is unnecessary; all

to the LAC.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. L2TP TunnelVPNs > L2TP > Tunnel > New: Enter the following, and then click OK:

Name: sales_corpUse Custom Settings: (select)Authentication Server: LocalDialup Group: Local Dialup Group - fsOutgoing Interface: ethernet3Peer IP: 0.0.0.04

Host Name (optional): Enter the name of the Secret (optional): Enter a secret shared betw

Keep Alive: 606

4. Because the peer’s ISP dynamically assigns it an IP address, enter 0.0.0.0 here.5. To find the name of a computer running Windows 2000, do the following: Click Start > Settings > Control Panel > S

box appears. Click the Network Identification tab, and see entry following Full computer name.

Note: To add a secret to the LAC for authenticating the L2TP tunnel, you mregistry as follows:

(1) Click Start > Run, and then type regedit . The Registry Editor opens(2) Click HKEY_LOCAL_MACHINE .(3) Right-click SYSTEM , and then select Find from the pop-up menu tha(4) Type ms_l2tpminiport , and then click Find Next .(5) In the Edit menu, highlight New, and then select String Value.(6) Type Password.(7) Double-click Password. The Edit String dialog box appears.(8) Type the password in the Value data field. This must be the same asConfiguration Secret field on the NetScreen device.(9) Reboot the computer running Windows 2000.

When using L2TP-over-IPSec, which is the Windows 2000 default, tunnel auL2TP messages are encrypted and authenticated inside IPSec.

6. The Keep Alive value is the number of seconds of inactivity before the NetScreen device sends an L2TP hello signal

Page 322: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

308

OK :

ctly as L2TP, you must unset the auth

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), Any

NAT: Off

Service: ANY

Action: Tunnel

Tunnel L2TP: sales_corp

Position at Top: (select)

CLI

1. Dialup Usersset user adam type l2tpset user adam password AJbioJ15

unset user adam type auth7

set user betty type l2tpset user betty password BviPsoJ1unset user betty type authset user carol type l2tpset user carol password Cs10kdD3unset user carol type auth

7. Defining a password for a user automatically classifies the user as an auth user. Therefore, to define the user type striuser type.

Page 323: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

309

ny tunnel l2tp

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. L2TP User Groupset user-group fs location localset user-group fs user adamset user-group fs user bettyset user-group fs user carol

3. Default L2TP Settingsset ippool global 10.10.2.100 10.10.2.180set l2tp default ippool globalset l2tp default auth server Localset l2tp default ppp-auth chapset l2tp default dns1 1.1.1.2set l2tp default dns2 1.1.1.3

4. L2TP Tunnelset l2tp sales_corp outgoing-interface ethernet3set l2tp sales_corp auth server Local user-group fs

5. Policyset policy top from untrust to trust “Dial-Up VPN” any a

sales_corpsave

Page 324: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

310

le: Configuring L2TP” on page yption. The IPSec tunnel DES encryption and SHA-1 g and loading certificates, see security level predefined as

g domain. The interfaces for the tively. The Trust zone is in NAT

s 2000 operating system8. The NetScreen-Remote

s must be in Main mode and the IKE

Trust Zone

Corporate Network

,4

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Configuring L2TP-over-IPSecThis example uses the same L2TP tunnel created in the previous example (“Examp304). Additionally, you overlay an IPSec tunnel onto the L2TP tunnel to provide encrnegotiates Phase 1 in Aggressive Mode using a previously loaded RSA certificate, 3authentication. The certificate authority (CA) is Verisign. (For information on obtaininChapter 2, “Public Key Cryptography” on page 23.)The Phase 2 negotiation uses the“Compatible” for Phase 2 proposals. The IPSec tunnel is in transport mode.

The predefined Trust zone and the user-defined Dialup zone are in the trust-vr routinDialup and Trust zones are ethernet2 (1.3.3.1/24) and ethernet1 (10.1.1.1/24) respecmode.

The dialup users Adam, Betty, and Carol use NetScreen-Remote clients on a WindowNetScreen-Remote configuration for dialup user Adam is also included below. (The configuration for the other two dialup users is the same as that for Adam.)

8. To configure an L2TP-over-IPSec tunnel for Windows 2000 (without the NetScreen-Remote), the Phase 1 negotiationID type must be ASN1-DN.

IKE-L2TPDialup User Group: fs

Adam

Betty

Carol

DNS 1: 1.1.1.2

DNS 2: 1.1.1.3

IP Pool: global10.10.2.100 �10.10.2.180

L2TP Tunnel: sales_corpVPN Tunnel: from_sales

Outgoing Interfaceethernet2, 1.3.3.1/24

Dialup Zone

ethernet110.1.1.1/2

Internet

NetScreen-Remote Clients

Page 325: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

311

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. User-Defined ZoneNetwork > Zones > New: Enter the following, and then click OK:

Zone Name: Dialup

Virtual Router Name: trust-vr

Zone Type: Layer 3 (select)

Block Intra-Zone Traffic: (select)

TCP/IP Reassembly for ALG: (clear)

2. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet2): Enter the following, and then clic

Zone Name: Dialup

Static IP: (select this option when present)

IP Address/Netmask: 1.3.3.1/24

Note: The Trust zone is preconfigured. You do not need to create it.

Page 326: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

312

address that appears in the certificate

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. IKE/L2TP UsersObjects > Users > Local > New: Enter the following, and then click OK :

User Name: Adam

Status: Enable

IKE User: (select)

Simple Identity: (select)9

IKE Identity: [email protected]

L2TP User: (select)

User Password: AJbioJ15

Confirm Password: AJbioJ15

Objects > Users > Local > New: Enter the following, and then click OK :

User Name: Betty

Status: Enable

IKE User: (select)

Simple Identity: (select)

IKE Identity: [email protected]

L2TP User: (select)

User Password: BviPsoJ1

Confirm Password: BviPsoJ1

9. The IKE ID that you enter must be the same as the one that the NetScreen-Remote client sends, which is the e-mail that the client uses for authentication.

Page 327: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

313

the following, and then click OK:

him from the Available lumn.

er from the Available Members

er from the Available Members

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Users > Local > New: Enter the following, and then click OK :

User Name: Carol

Status: Enable

IKE User: (select)

Simple Identity: (select)

IKE Identity: [email protected]

L2TP User: (select)

User Password: Cs10kdD3

Confirm Password: Cs10kdD3

4. IKE/L2TP User Group

Objects > User Groups > Local > New: Type fs in the Group Name field, do

Select Adam and use the << button to move Members column to the Group Members co

Select Betty and use the << button to move hcolumn to the Group Members column.

Select Carol and use the << button to move hcolumn to the Group Members column.

Page 328: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

314

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. IP PoolObjects > IP Pools > New: Enter the following, and then click OK:

IP Pool Name: global

Start IP: 10.10.2.100

End IP: 10.10.2.180

6. Default L2TP Settings

VPNs > L2TP > Default Settings: Enter the following, and then click Apply :

IP Pool Name: global

PPP Authentication: CHAP

DNS Primary Server IP: 1.1.1.2

DNS Secondary Server IP: 1.1.1.3

WINS Primary Server IP: 0.0.0.0

WINS Secondary Server IP: 0.0.0.0

Page 329: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

315

s

e L2TP tunnel to a specific as the LAC11.

een the LAC and the LNS12

ystem . The System Properties dialog

usually be ignored. Only ese settings.

note in the previous example.

to the LAC.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

7. L2TP TunnelVPNs > L2TP > Tunnel > New: Enter the following, and then click OK:

Name: sales_corp

Dialup Group: (select), Local Dialup Group - f

Authentication Server: Local

Outgoing Interface: ethernet2

Peer IP: 0.0.0.010

Host Name (optional): If you want to restrict thhost, enter the name of the computer acting

Secret (optional): Enter a secret shared betw

Keep Alive: 6013

10. Because the IP address of the peer is dynamic, enter 0.0.0.0 here.

11. To find the name of a computer running Windows 2000, do the following: Click Start > Settings > Control Panel > Sbox appears. Click the Network Identification tab, and see entry following Full computer name.

Note: The host name and secret settings canadvanced users are recommended to use th

12. To add a secret to the LAC for authenticating the L2TP tunnel, you must modify the Windows 2000 registry. See the

13. The Keep Alive value is the number of seconds of inactivity before the NetScreen device sends an L2TP hello signal

Page 330: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

316

click OK:

ttings, and then click Return to age:ustom

sha

ttings, and then click Return to on page:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. VPN TunnelVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: field

Security Level: Custom

Remote Gateway Type:

Dialup User Group: (select), Group: fs

Outgoing Interface: ethernet2

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: User Defined: C

Phase 1 Proposal: rsa-g2-3des-

Mode (Initiator): Aggressive14

Preferred Certificate (Optional):

Peer CA: Verisign

Peer Type: X509-SIG

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

Name: from_sales

Security Level: Compatible

Remote Gateway: Predefined: field

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Security Level: Compatible

Transport Mode: (select)

14. Windows 2000 (without NetScreen-Remote) supports Main mode negotiations only.

Page 331: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

317

OK :

clear)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

9. PolicyPolicies > (From: Dialup, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), Any

Service: ANY

Action: Tunnel

Tunnel VPN: from_sales

Modify matching bidirectional VPN policy: (

L2TP: sales_corp

Position at Top: (select)

Page 332: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

318

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI1. User-Defined Zone

set zone name dialupset zone dialup vrouter trust-vrset zone dialup block

2. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet2 zone dialupset interface ethernet2 ip 1.3.3.1/24

3. L2TP/IKE Usersset user adam type ike l2tpset user adam password AJbioJ15unset user adam type authset user adam ike-id u-fqdn [email protected] user betty type ike l2tpset user betty password BviPsoJ1unset user betty type authset user betty ike-id u-fqdn [email protected] user carol type ike l2tpset user carol password Cs10kdD3unset user carol type authset user carol ike-id u-fqdn [email protected]

4. IKE/L2TP User Groupset user-group fs location Localset user-group fs user adamset user-group fs user bettyset user-group fs user carol

Page 333: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

319

erface ethernet2

patible

tunnel vpn from_sales

a-cert .

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. IP Poolset ippool global 10.10.2.100 10.10.2.180

6. Default L2TP Settingsset l2tp default ippool globalset l2tp default ppp-auth chapset l2tp default dns1 1.1.1.2set l2tp default dns2 1.1.1.3

7. L2TP Tunnelset l2tp sales_corp outgoing-interface ethernet2set l2tp sales_corp auth server Local user-group fs

8. VPN Tunnel

set ike gateway field dialup fs aggressive15 outgoing-intproposal rsa-g2-3des-sha

set ike gateway field cert peer-ca116

set ike gateway field cert peer-cert-type x509-sigset vpn from_sales gateway field transport sec-level com

9. Policyset policy top from dialup to trust “Dial-Up VPN” any any

l2tp sales_corpsave

15. Windows 2000 (without NetScreen-Remote) supports Main mode negotiations only.

16. The number 1 is the CA ID number. To discover the CA’s ID number, use the following command: get pki x509 list c

Page 334: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

320

that appears.

r)

nection policy.

pecified as the user’s IKE ID on ficate drop-down list

en the PLUS symbol to the left icy further.

s that provided here for Adam.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor (Adam17)

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection , and type AJ next to the new connection icon

3. Configure the connection options:

Connection Security: Secure

Remote Party ID Type: IP Address

IP Address: 1.3.3.1

Protocol: UDP

Port: L2TP

Connect using Secure Gateway Tunnel: (clea

4. Click the PLUS symbol, located to the left of the AJ icon, to expand the con

5. Click My Identity , and configure the following:

Select the certificate with the e-mail address sthe NetScreen device from the Select Certi

ID Type: E-mail Address18

Port: L2TP

6. Click the Security Policy icon, and select Aggressive Mode.

7. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

17. To configure L2TP-over-IPSec tunnels for Betty and Carol’s NetScreen-Remote clients, follow the same procedure a

18. The e-mail address from the certificate appears in the identifier field automatically.

Page 335: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

321

ication Method and Algorithms:

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Authentication Method: RSA Signatures

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 2

9. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Transport

10. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Transport

11. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Transport

Page 336: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

322

ng IPSec Protocols:

ating system using the Network

destination host name or IP d for a user name and indows 2000 documentation.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

12. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Transport

13. Click File > Save Changes.

14. You also need to set up the network connection for your Windows 2000 operConnection Wizard.

Note: When configuring the Network Connection Wizard, you must enter aaddress. Enter 1.3.3.1. Later, when initiating a connection and are promptepassword, enter adam, AJbioJ15. For more information, consult Microsoft W

Page 337: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

323

, and ethernet3 (1.1.1.1/24) is n-Remote dialup user and a bidirectional policies.

named VPN_dial for IKE user tes a IPSec connection to the

. At this point, only L2TP d. With bidirectional policies

ing system19. The e.

must be in Main mode and the IKE

ethernet10.1.1.1/24

Unix Server

Trust Zone

LAN

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Bidirectional L2TP-over-IPSecIn this example, ethernet1 (10.1.1.1/24) is the Trust zone interface and is in NAT modethe Untrust zone interface. You create L2TP-over-IPSec tunnels between a NetScreecorporate LAN. The remote user is running an X-Windows application, which requires

You configure incoming and outgoing policies for the dialup AutoKey IKE VPN tunneldialup-j with IKE ID [email protected]., and the L2TP tunnel named tun1. The IKE user initiaNetScreen device from the Untrust zone to reach corporate servers in the Trust zonecommunication is allowed. After L2TP/PPP negotiation, the L2TP tunnel is establisheconfigured, traffic can initiate from either end of the tunnel.

The dialup user dialup-j uses a NetScreen-Remote client on a Windows 2000 operatNetScreen-Remote configuration for dialup user dialup-j is included after this exampl

19. To configure an L2TP-over-IPSec tunnel for Windows 2000 (without the NetScreen-Remote), the Phase 1 negotiationsID type must be ASN1-DN.

1ethernet31.1.1.1/24

NetScreen-Remote Client running X-Windows Server

Internet

Dialup Zone

L2TP-over-IPSec Tunnel

External Router1.1.1.250

Page 338: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

324

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: trust_net

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Page 339: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

325

address that appears in the certificate

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. L2TP/IKE UserObjects > Users > Local > New: Enter the following, and then click OK :

User Name: dialup-j

Status: Enable

IKE User: (select)

Simple Identity: (select)20

IKE Identity: [email protected]

Authentication User: (select)

L2TP User: (select)

User Password: abc123

Confirm Password: abc123

4. L2TPVPNs > L2TP > Tunnel > New: Enter the following, and then click OK:

Name: tun1

Use Default Settings: (select)

Secret: netscreen

Keepalive: 60

20. The IKE ID that you enter must be the same as the one that the NetScreen-Remote client sends, which is the e-mail that the client uses for authentication.

Page 340: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

326

click OK:

, dialup-j

Return to return to the basic

1

Return to return to the basic

)

-IPSec only): (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: dialup1

Security Level: (select); Standard

Remote Gateway Type: Dialup User; (select)

Preshared Key: n3TsCr33N

Outgoing Interface: (select) ethernet3

> Advanced: Enter the following, and the clickAutoKey IKE Gateway configuration page:

Mode (Initiator): Aggressive

Enable NAT-Traversal: (select)

UDP Checksum: (select)

Keepalive Frequency: 5

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN_dial

Remote Gateway: Predefined: (select), dialup

> Advanced: Enter the following, and the clickAutoKey IKE configuration page:

Security Level: Standard (select

Transport Mode (For L2TP-over

Page 341: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

327

lick OK :

k OK:

select)

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. RouteNetwork > Routing > Routing Entries > New: Enter the following, and then c

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

7. PoliciesPolicies > (From: Untrust, To: Trust > New: Enter the following, and then clic

Source Address:

Address Book Entry: (select), Dial-Up VPN

Destination Address:

Address Book Entry: (select), trust_net

Service: ANY

Action: Tunnel

Tunnel VPN: VPN_dial

Modify matching bidirectional VPN policy: (

L2tp: (select) tun1

Policies > (From: Trust, To: Untrust > New: Enter the following, and then clic

Source Address:

Address Book Entry: (select), trust_net

Destination Address:

Address Book Entry: (select), Dial-Up VPN

Service: ANY

Page 342: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

328

select)

reen" keepalive 60

going-interface

y 5 etime 0 sec-level

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Action: Tunnel

Tunnel VPN: VPN_dial

Modify matching bidirectional VPN policy: (

L2TP: tun1

CLI

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 natset interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

2. Addressset address trust trust_net 10.1.1.0/24

3. L2TP/IKE Userset user dialup-j ike-id u-fqdn [email protected] user dialup-j type auth ike l2tpset user dialup-j password abc123

4. L2TPset l2tp tun1 outgoing-interface ethernet3 secret "netsc

5. VPNset ike gateway dialup1 dialup "dialup-j" aggressive out

ethernet3 preshare n3TsCr33N sec-level standard set ike gateway dialup1 nat-traversal udp-checksum set ike gateway dialup1 nat-traversal keepalive-frequencset vpn VPN_dial gateway dialup1 no-replay transport idl

standard

Page 343: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

329

gateway 1.1.1.250

t” any tunnel vpn

any tunnel vpn

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

7. Policiesset policy from untrust to trust “Dial-Up VPN” “trust_ne

VPN_dial tun1set policy from trust to untrust trust_net “Dial-Up VPN”

VPN_dial l2tp tun1save

Page 344: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

330

icon that appears.

r)

connection policy.

pecified as the user’s IKE ID on ficate drop-down list

en the PLUS symbol to the left icy further.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen-Remote Security Policy Editor (for user dialup-j)

1. Click Options > Secure > Specified Connections .

2. Click Add a new connection, and type dialup-j next to the new connection

3. Configure the connection options:

Connection Security: Secure

Remote Party ID Type: IP Address

IP Address: 1.1.1.1

Protocol: UDP

Port: L2TP

Connect using Secure Gateway Tunnel: (clea

4. Click the PLUS symbol, located to the left of the dialup-j icon, to expand the

5. Click My Identity , and configure the following:

Select the certificate with the e-mail address sthe NetScreen device from the Select Certi

ID Type: E-mail Address21

Port: L2TP

6. Click the Security Policy icon, and select Aggressive Mode.

7. Click the PLUS symbol, located to the left of the Security Policy icon, and thof Authentication (Phase 1) and Key Exchange (Phase 2) to expand the pol

21. The e-mail address from the certificate appears in the identifier field automatically.

Page 345: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

331

ication Method and Algorithms:

rotocols:

ng IPSec Protocols:

ng IPSec Protocols:

abled for the VPN client in NetScreen

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

8. Click Authentication (Phase 1) > Proposal 1: Select the following Authent

Authentication Method: Pre-Shared Key

(or)

Authentication Method: RSA Signatures

Hash Alg: SHA-1

Key Group: Diffie-Hellman Group 222

9. Click Key Exchange (Phase 2) > Proposal 1: Select the following IPSec P

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: SHA-1

Encapsulation: Transport

10. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: Triple DES

Hash Alg: MD5

Encapsulation: Transport

11. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: SHA-1

Encapsulation: Transport

22. When Perfect Forwarding Secrecy (PFS) is enabled on the NetScreen device (DF Group 1,2 or 5), it must also be enRemote.

Page 346: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 6 L2TP L2TP and L2TP-over-IPSec

332

ng IPSec Protocols:

stem using the Network

ion host name or IP address. ame and password, enter tion.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

12. Click Key Exchange (Phase 2) > Create New Proposal: Select the followi

Encapsulation Protocol (ESP): (select)

Encrypt Alg: DES

Hash Alg: MD5

Encapsulation: Transport

13. Click File > Save Changes.

You also need to set up the network connection for your Windows 2000 operating syConnection Wizard.

Note: When configuring the Network Connection Wizard, you must enter a destinatEnter 1.1.1.1. Later, when initiating a connection and you are prompted for a user ndialup-j, abc123. For more information, consult Microsoft Windows 2000 documenta

Page 347: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

7

333

Chapter 7

ology:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Advanced VPN Features

The material in this chapter covers the following more advanced uses of VPN techn

• “NAT-Traversal” on page 335

– “Traversing a NAT Device” on page 338

– “UDP Checksum” on page 341

– “Keepalive Packets” on page 341

– “Initiator/Responder Symmetry” on page 342

• “VPN Monitoring” on page 345

– “Rekey and Optimization Options” on page 346

– “Source Interface and Destination Address” on page 347

– “Policy Considerations” on page 349

– “Configuring the VPN Monitoring Feature” on page 349

– “Security Consideration for a Route-Based VPN Design” on page 362

– “SNMP VPN Monitoring Objects and Traps” on page 364

• “Multiple Tunnels per Tunnel Interface” on page 365

– “Route-to-Tunnel Mapping” on page 366

– “Remote Peers’ Addresses” on page 367

– “Manual and Automatic Table Entries” on page 369

• “Redundant VPN Gateways” on page 424

– “VPN Groups” on page 425

– “Monitoring Mechanisms” on page 426

– “TCP SYN-Flag Checking” on page 430

Page 348: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features

334

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

• “VPN Tunnel Failover Behavior” on page 443

– “Example: VPN Failover to Leased Line or Null Route” on page 445

• “Back-to-Back VPNs” on page 448

– “Example: Back-to-Back VPNs” on page 449

• “Hub-and-Spoke VPNs” on page 459

– “Example: Hub-and-Spoke VPNs” on page 460

Page 349: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

335

re Internet standards that allow econd set of addresses for pools of IP addresses.

has no effect on Phase 1 and ram Protocol (UDP) segments. ckets causes the tunnel to fail. e Encapsulating Security

ort translation (because it is e port number, but the

sion 6.0 or later2) can apply a packets after detecting one or the IETF drafts ter versions of these drafts.

pt to process packets with the . To avoid such intermediary es the shifting (or “floating”) of ec packets, both drafts 0 and 2

by changing the value in the , the inserted UDP header also tf-ipsec-nat-t-ike-02.txt and

ncaps-00.txt. NetScreen-Remote 8.2

ic using AH. NetScreen only

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NAT-TRAVERSALNetwork Address Translation (NAT) and Network Address Port Translation (NAPT) aa local-area network (LAN) to use one set of IP addresses for internal traffic and a sexternal traffic. NAT devices generate these external addresses from predetermined

When setting up an IPSec tunnel, the presence of a NAT device along the data pathPhase 2 IKE negotiations, which always encapsulate IKE packets within User DatagHowever, after the Phase 2 negotiations complete, performing NAT on the IPSec paOf the many reasons why NAT causes disruption to IPSec1, one reason is that, for thProtocol (ESP), NAT devices cannot discern the location of the Layer 4 header for pencrypted). For the Authentication Header (AH) protocol, NAT devices can modify thauthentication check, which includes the entire IPSec packet, fails.

To solve these problems, NetScreen devices and the NetScreen-Remote client (verNAT-Traversal (NAT-T) feature. NAT-T adds a layer of UDP encapsulation to IPSecmore NAT devices along the data path during Phase 1 exchanges, as prescribed in draft-ietf-ipsec-nat-t-ike-00.txt and draft-ietf-ipsec-udp-encaps-00.txt , as well as in la

NAT devices can create another problem if they are also IKE/IPSec-aware and attemIKE port number of 500 or the IPSec protocol numbers 50 (for ESP) and 51 (for AH)processing of IKE packets, version 2 of the previously mentioned IETF drafts proposUDP port numbers for IKE from 500 to 4500. To avoid intermediary processing of IPSinsert a UDP header between the outer IP header and the ESP or AH header, thereProtocol field from 50 or 51 (for ESP or AH respectively) to 17 (for UDP). In additionuses port 4500. The current version of ScreenOS supports NAT-T based on draft-iedraft-ietf-ipsec-udp-encaps-02.txt, as well as version 0 of these drafts.

1. For a list of IPSec/NAT incompatibilities, see draft-ietf-ipsec-nat-regts-00.txt by Bernard Aboba.

2. NetScreen-Remote 6 and 7 supports NAT-T as described in draft-ietf-ipsec-nat-t-ike-00.txt and draft-ietf-ipsec-udp-esupports drafts 02.

Note: NetScreen does not support NAT-T for Manual Key tunnels nor for IPSec traffsupports NAT-T for AutoKey IKE tunnels using ESP.

Page 350: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

336

-5 hashes in the vendor ID draft 0 and one of the title for

ft-ietf-ipsec-nat-t-ike-00”

t-ietf-ipsec-nat-t-ike-02”

d ID for the NAT-T probe to ation for draft 2.

(NAT-D) payloads in the third ggressive mode)3. The NAT-D

mber is 0130. For a list of other IKE

pecify an outgoing interface.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Probing for NATTo check that both ends of the VPN tunnel support NAT-T, NetScreen sends two MDpayload in the first two exchanges of Phase 1 negotiations—one hash for the title ofdraft2:

• “4485152d 18b6bbcd 0be8a846 9579ddcc”—which is an MD-5 hash of “dra

• “90cb8091 3ebb696e 086381b5 ec427b1f”—which is an MD-5 hash of “draf

Both peers must send and receive at least one of these values in the vendor payloacontinue. If they send hashes for both drafts, NetScreen uses the NAT-T implement

If the devices at each endpoint support NAT-T, they send each other NAT discoveryand fourth Phase 1 exchanges (Main mode) or in the second and third exchanges (Apayloads contain a negotiated hash of the following information:

• Destination NAT-D hash:

Initiator’s cookie (CKY-I)

Responder’s cookie (CKY-R)

Remote (destination) IKE peer’s IP address

Destination port number

• Source NAT-D hash (one or more4):

Initiator’s cookie (CKY-I)

Responder’s cookie (CKY-R)

Local (source) IKE peer’s IP address

Source port number

3. The NAT discovery (NAT-D) payload is a newly introduced IKE payload type for NAT-T. The NAT-D payload type nupayload types, see “IKE Packets” on page 15.

4. NAT-T supports multiple source NAT-D hashes for devices with multiple interfaces and implementations that do not s

Page 351: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

337

address translation has es the location of the NAT

itiate from the peer behind the

to 4500 as soon as they detect ort numbers float to 4500 in the sive mode, the port number exchanges. The peers also use

slation has occurred.

slation has occurred.

in front of the remote peer.

in front of the local peer.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

When each peer compares the hashes it receives with the ones it sends, it can tell ifoccurred between them. Distinguishing which packet has been modified also indicatdevice:

Knowing the location of the NAT device is important because IKE keepalives must inNAT device. See “Keepalive Packets” on page 341.

If both peers support IETF draft 2, then they also float the IKE port number from 500a NAT device between themselves during Phase 1 negotiations. In Main mode, the pfifth and sixth exchanges of Phase 1, and then for all Phase 2 exchanges. In Aggresfloats to 4500 in the third—and final—exchange of Phase 1, and then for all Phase 2 4500 for the UDP port number for all subsequent IPSec traffic.

If Matches Thenthe local peer�s destination hash at least one of the remote peer�s

source hashesno address tran

at least one of the local peer�s source hashes

the remote peer�s destination hash

no address tran

If Does not match Thenthe local peer�s destination hash at least one of the remote peer�s

source hashesa NAT device is

at least one of the local peer�s source hashes

the remote peer�s destination hash

a NAT device is

Page 352: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

338

packet from a VPN dialup client ce replaces the original source ions, the VPN client and the ice is present along the data

d the NetScreen device do—em as UDP packets, changing odified. The VPN participants

n check because none of the

re NAT device might attempt to ssing, NAT-T (v2) changes the

erts a non-ESP marker in the DP header between the outer

and destination port numbers.

d of the UDP segment nd is added to the UDP packet, which does not have capsulated packet was an

rate

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Traversing a NAT DeviceIn the following illustration, a NAT device at the perimeter of a hotel LAN receives a with IP address 2.1.1.5, assigned by the hotel. For all outbound traffic, the NAT deviIP address in the outer header with a new address 2.2.2.2. During Phase 1 negotiatNetScreen device detect that both VPN participants support NAT-T, that a NAT devpath, and that it is located in front of the VPN client.

Encapsulating the IPSec packets within UDP packets—which both the VPN client ansolves the problem of the authentication check failure. The NAT device processes ththe source port in the UDP header and leaving the SPI in the AH or ESP header unmstrip off the UDP layer and process the IPSec packets, which pass the authenticatioauthenticated content has been changed.

Another problem can arise if the NAT device is IKE/IPSec-aware. An IKE/IPSec-awaprocess IKE/IPSec traffic instead of forwarding it. To prevent such intermediary procesource and destination UDP port numbers for IKE from 500 to 4500. NAT-T also insUDP header just before the payload. For IPSec traffic, NAT-T (v0 and v2) inserts a UIP header and the ESP header. The UDP packet also uses 4500 for both the source

As mentioned, NAT-T (v2) adds a Non-ESP marker between the header and payloaencapsulating the ISAKMP packet. The non-ESP marker is 4 bytes of zero (0000), asegment to distinguish an encapsulated ISAKMP packet from an encapsulated ESPsuch a marker. Without the non-ESP marker, the recipient would be unsure if the en

NAT DeviceInternet

NetScreen Device

Src IP 200.1.1.1 -> 210.2.2.2

Hotel Corpo

VPN Tunnel

VPN Dialup Client

Page 353: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

339

s. Using this marker indicates ultiplex it.

ath, the source and destination VPN tunnel endpoints insert a ted ISAKMP packet from an

MP packet from an ESP packet

s.

for IKE)

for IKE)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

ISAKMP packet or an ESP packet because the UDP header uses 4500 for both typethe correct type of packet that is encapsulated so that the recipient can correctly dem

As you can see in the following illustration, after detecting a NAT device in the data pport numbers in the UDP header of an IKE packet change from 500 to 4500. Also, thenon-ESP marker between the UDP header and payload to distinguish the encapsulaESP packet. The recipient can use this marker to distinguish the encapsulated ISAKand demultiplex it correctly.

IKE Packet(For Phases 1 and 2)

UDPHeader

IPHeader

ISAKMPHeader Payload

Note: ISAKMP is the packet format that IKE use

Payload

UDP Segment

Length

Source Port (500 for IKE)

Checksum

Destination Port (500

Payload

UDP Segment after detecting a NAT device

Length

Source Port (4500 for IKE)

Checksum

Destination Port (4500

Non-ESP Marker (0000)

Page 354: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

340

path, the VPN tunnel endpoints f an IPSec packet. Because ket from an ISAKMP packet

yload

for ESP)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

As you can see in the following illustration, after detecting a NAT device in the data insert an additional UDP header between the outer IP header and the ESP header othere is no non-ESP marker, the recipient can distinguish the encapsulated ESP pacand demultiplex the ESP packet correctly.

IPSec ESP Packet after detecting a NAT device

UDPHeader

IP2Header

ESPHeader

IP1Header

TCPHeader Pa

Original PacketSent by Initiating Host

IPSec PacketSent by IKE Gateway

The local gateway adds these headers to the packet.

IPSec Packet � Encapsulating Security Payload (ESP)

IP2Header

ESPHeader

IP1Header

TCPHeader Payload

Original PacketSent by Initiating Host

IPSec PacketSent by IKE Gateway

The local gateway adds these headers to the packet.

Payload

UDP Header

Length

Source Port (4500 for ESP)

Checksum

Destination Port (4500

Page 355: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

341

kets are free of transmission o the WebUI and CLI present m, so you might have to enable AT-T.

ters for the new tunnel gateway alup VPNs” on page 221, enter

ttings, and then click Return to age:

long the new address remains ted IP address that remains to send periodic keepalive oes not change until the

ufacturer and model. It is live frequency value below that.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

UDP ChecksumAll UDP packets contain a UDP checksum, a calculated value that ensures UDP pacerrors. A NetScreen device does not require use of the UDP checksum for NAT-T, sthe checksum as an optional setting. Even so, some NAT devices require a checksuor disable this setting. By default, the UDP checksum is included when you enable N

WebUI

VPNs > AutoKey Advanced > Gateway > New: Enter the necessary parameas described in Chapter 4, “Site-to-Site VPNs” on page 91 or Chapter 5, “Dithe following, and then click OK:

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Enable NAT-Traversal: (select)

UDP Checksum: Enable

CLI

set ike gateway name nat-traversal udp-checksumunset ike gateway name nat-traversal udp-checksum

Keepalive PacketsWhen a NAT device assigns an IP address to a host, the NAT device determines howvalid when no traffic occurs. For example, a NAT device might invalidate any generaunused for 20 seconds. Therefore, it is usually necessary for the IPSec participants packets—empty UDP packets—through the NAT device, so that the NAT mapping dPhase 1 and Phase 2 SAs expire.

Note: NAT devices have different session timeout intervals, depending on the manimportant to determine what the interval is for the NAT device, and to set the keepa

Page 356: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

342

er device can serve as initiator ponder symmetry might be ically.

ce. If the NAT device generates ynamically from a pool of IP

etScreen A cannot successfully the initiator, and they must

address, or some other B. Consequently, either gressive mode for Phase 1.

Host B10.1.1.5

Trust Zone

lates the source IP address from NetScreen B using its IP address pool.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Initiator/Responder SymmetryWhen two NetScreen devices establish a tunnel in the absence of a NAT device, eithor responder. However, if either host resides behind a NAT device, such initiator/resimpossible. This happens whenever the NAT device generates IP addresses dynam

In the above illustration, NetScreen B resides in a subnet located behind a NAT devinew source IP addresses for packets it receives from NetScreen B—drawing them daddresses—NetScreen A cannot unambiguously identify NetScreen B. Therefore, Ninitiate a tunnel with NetScreen B. NetScreen A must be the responder, NetScreen Bperform Phase 1 negotiations in Aggressive mode.

However, if the NAT device generates the new IP address using a mapped IP (MIP)one-to-one addressing method, NetScreen A can unambiguously identify NetScreenNetScreen A or NetScreen B can be the initiator, and both can use Main mode or Ag

Host ANetScreen A NetScreen B

NATDevice

1.2.1.1 1.1.1.250

Internet

Untrust Zone

Note: Security zones depicted below are from the perspective of NetScreen B.

Tunnel

IP Address Pool1.2.1.2 - 1.2.1.50

The NAT device transin packets it receives addresses drawn from

Page 357: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

343

ddress to the VPN dialup client ach the corporate LAN via a ured on the NetScreen device, NetScreen device to include a ds.

figure it to perform IKE hat are configured on the same der as each other:

n Main mode until the last two n proceed.

e and in the same order when g interface. If the proposals are

rate

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Enabling NAT-TraversalIn the following example, a NAT device at the perimeter of a hotel LAN assigns an aused by Michael Smith, a salesman attending a convention. For Michael Smith to redialup VPN tunnel, you must enable NAT-T for the remote gateway “msmith,” configand for the remote gateway configured on the VPN dialup client. You also enable theUDP checksum in its transmissions, and you set the keepalive frequency to 8 secon

Note: If you enable NAT-T on a NetScreen device acting as the responder and connegotiations in Main mode, then that device and all its peers of the following types toutgoing interface must use the same Phase 1 proposals presented in the same or

• Dynamic peer (peers with dynamically assigned IP addresses)• Dialup VPN users• Peers with static IP addresses behind a NAT device

Because it is not possible to know the identity of a peer when negotiating Phase 1 imessages, the Phase 1 proposals must all be the same so that IKE negotiations ca

The NetScreen device automatically checks that all Phase 1 proposals are the samyou configure IKE in Main mode to one of the above peer types on the same outgoindifferent, the NetScreen device generates an error message.

NAT DeviceInternet

NetScreen Device

Hotel Corpo

VPN Tunnel

VPN Dialup Client

Page 358: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features NAT-Traversal

344

ters for the new tunnel gateway alup VPNs” on page 221, enter

ttings, and then click Return to age:

s (0~300 Sec)

8

vice automatically enables

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

VPNs > AutoKey Advanced > Gateway > New: Enter the necessary parameas described in Chapter 4, “Site-to-Site VPNs” on page 91 or Chapter 5, “Dithe following, and then click OK:

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Enable NAT-Traversal: (select)

UDP Checksum: Enable

Keepalive Frequency: 8 Second

CLI

set ike gateway msmith nat-traversalset ike gateway msmith nat-traversal udp-checksumset ike gateway msmith nat-traversal keepalive-frequencysave

Note: When you configure a dialup VPN through the CLI, the NetScreen deNAT-Traversal.

Page 359: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

345

ICMP echo requests (or r network connectivity through , the NetScreen device triggers

nel is up, but a specified is no other incoming VPN

the ICMP echo request elicits a nly if you have disabled the licits a reply through the tunnel.

bject is what you define with the you can then reference it in one based VPN tunnel from a VPN merous VPN tunnels. This

rks recommends that you apply ization. If you do enable

an apply VPN monitoring. To 346.

is 10 seconds.

CLI command: set vpnmonitor

e �SNMP VPN Monitoring

on all VPN objects, on none, or

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPN MONITORINGWhen you enable VPN monitoring for a specific tunnel, the NetScreen device sends“pings”) through the tunnel at specified intervals (configurable in seconds) to monitothe tunnel.5 If the ping activity indicates that the VPN monitoring status has changedone of the following Simple Network Management Protocol (SNMP) traps:

• Up to Down: This trap occurs when the state of VPN monitoring for the tunconsecutive number of ICMP echo requests does not elicit a reply and theretraffic.6 Then the state changes to down.

• Down to Up: When the state of VPN monitoring for the tunnel is down, but single response, then the state changes to up. The down-to-up trap occurs orekey option and the Phase 2 SA is still active when an ICMP echo request e

You apply VPN monitoring per VPN object, not necessarily per VPN tunnel. A VPN oset vpn command, or with its WebUI counterpart. After you define one VPN object, or more policies (creating policy-based VPNs). Because ScreenOS derives a policy-object plus the other policy parameters, a single VPN object can be an element in nudistinction between VPN object and VPN tunnel is important because Juniper NetwoVPN monitoring to no more than 100 IPSec VPN tunnels—if you do not enable optimoptimization, then there is no limitation to the number of VPN tunnels to which you clearn about the optimization option, see “Rekey and Optimization Options” on page

5. To change the ping interval, you can use the following CLI command: set vpnmonitor interval number. The default

6. To change the threshold for the number of consecutive unsuccessful ICMP echo requests, you can use the followingthreshold number. The default is 10 consecutive requests.

Note: For more information about the SNMP data that VPN monitoring provides, seObjects and Traps� on page 364.

Note: VPN monitoring optimization operates on a per-object basis. You can enable itjust on some.

Page 360: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

346

ests immediately upon cho requests trigger an attempt g for the tunnel is up. The PN monitoring for the tunnel ociation (SA) for that peer. The iggering attempts to reinitiate s. At that point, the NetScreen el. A message appears in the

rhaps to monitor devices at the transmit messages through the for automatic population of the nnels are bound to a single terface” on page 365.

when the tunnel is active with

update to the same address does not

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Rekey and Optimization OptionsIf you enable the rekey option, the NetScreen device starts sending ICMP echo requcompletion of the tunnel configuration and continues to send them indefinitely. The eto initiate IKE negotiations to establish a VPN tunnel until the state of VPN monitorinNetScreen device then uses the pings for VPN monitoring purposes. If the state of Vchanges from up to down, the NetScreen device deactivates its Phase 2 security assNetScreen device continues to send echo requests to its peer at defined intervals, trIKE Phase 2 negotiations—and Phase 1 negotiations, if necessary—until it succeeddevice reactivates the Phase 2 SA, generates a new key, and reestablishes the tunnevent log stating that a successful rekey operation has occurred7.

You can use the rekey option to ensure that an AutoKey IKE tunnel is always up, peremote site or to allow dynamic routing protocols to learn routes at a remote site andtunnel. Another use to which you can apply VPN monitoring with the rekey option is next-hop tunnel binding table (NHTB table) and the route table when multiple VPN tutunnel interface. For an example of this last use, see “Multiple Tunnels per Tunnel In

If you disable the rekey option, the NetScreen device performs VPN monitoring onlyuser-generated traffic.

7. If a NetScreen device is a DHCP client, a DHCP update to a different address causes IKE to rekey. However, a DHCPprovoke the IKE rekey operation.

Page 361: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

347

monitor optimized), the VPN

be the equivalent of ICMP echo reduce false alarms that might et through.

tScreen device suppresses

itoring can no longer provide ption is active. Also, if you are the remote end of a tunnel, the

rface as the source address peer is a VPN dialup client—ice automatically detects its

ser with an assigned internal IP address. You can also specify provide support for VPN

ource address configured on ured on the device at the other end.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

By default, VPN monitoring optimization is disabled. If you enable it (set vpn name monitoring behavior changes as follows:

• The NetScreen device considers incoming traffic through the VPN tunnel to replies. Accepting incoming traffic as a substitute for ICMP echo replies canoccur when traffic through the tunnel is heavy and the echo replies do not g

• If there is both incoming and outgoing traffic through the VPN tunnel, the NeVPN monitoring pings altogether. Doing so can help reduce network traffic.

Although VPN monitoring optimization offers some benefits, be aware that VPN monaccurate SNMP statistics, such as VPN network delay time, when the optimization ousing VPN monitoring to track the availability of a particular destination IP address atoptimization feature can produce misleading results.

Source Interface and Destination AddressBy default, the VPN monitoring feature uses the IP address of the local outgoing inteand the IP address of the remote gateway as the destination address. If the remote such as the NetScreen-Remote—that has an internal IP address, the NetScreen devinternal address and uses that as the destination. The VPN client can be an XAuth uaddress, or a dialup VPN user or a member of a dialup VPN group with an internal IPthe use of other source and destination IP addresses for VPN monitoring—mainly tomonitoring when the other end of a VPN tunnel is not a NetScreen device.

Because VPN monitoring operates independently at the local and remote sites, the sthe device at one end of a tunnel does not have to be the destination address configend. In fact, you can enable VPN monitoring at both ends of a tunnel or only at one

Page 362: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

348

its address through XAuth, then nation for VPN monitoring. For

ntrust Zone

n Address: Gateway

ntrust Zone

Third-PartyVPN Terminator

NetScreen-B

ntrust Zone

Destination Address:NetScreen-Remote

Destination Address:FTP Server

LAN

st to Untrust zones.

st to Untrust zones.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Note: If the other end of a tunnel is the NetScreen-Remote VPN client that receives the NetScreen device, by default, uses the XAuth-assigned IP address as the destiinformation about XAuth, see �XAuth Users and User Groups� on page 8 -81.

VPN Tunnel

UTrust Zone

Source Address:Outgoing Interface

DestinatioRemote

NetScreen-A pings from its Trust zone interface to the NetScreen-Remote. The NetScreen-Remote requires a policy permitting inbound ICMP traffic from an address beyond the remote gateway; that is, from beyond the Untrust zone interface of NetScreen-A.

Trust Zone U

NetScreen-A

NetScreen-A

NetScreen-A pings from its outgoing interface to the remote gateway; that is, from the Untrust zone interface on NetScreen-A to the Untrust zone interface on NetScreen-B.(Default Behavior)

VPN Tunnel

VPN Tunnel

UTrust Zone

NetScreen-A

Source Address:Trust Zone Interface

Source Address:Trust Zone Interface

LAN

LAN

LAN

NetScreen-A �> NetScreen-Remote

NetScreen-A �> NetScreen-B

NetScreen-A pings from its Trust zone interface to a device beyond the remote gateway. This might be necessary if the remote peer does not respond to pings but can support policies permitting inbound ping traffic.

NetScreen-A �> Third-Party VPN Terminator

Note: NetScreen-A requires a policy permitting ping traffic from the Tru

Note: NetScreen-A requires a policy permitting ping traffic from the Tru

Page 363: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

349

ing the source interface to pass

razone blocking is enabled.

one containing the source ss if:

azone blocking is enabled.

following, click Return to go

g of this VPN tunnel.

e drop-down list. If you choose tgoing interface.

. If you do not enter anything, way IP address.

creen device to attempt IKE gotiations if necessary—if the en you select this option, the

P echo requests, change the ote peer�s firewall must have a

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policy ConsiderationsYou must create a policy on the sending device to permit pings from the zone containthrough the VPN tunnel to the zone containing the destination address if:

• The source interface is in a different zone from the destination address.

• The source interface is in the same zone as the destination address, and int

Likewise, you must create a policy on the receiving device to permit pings from the zaddress to pass through the VPN tunnel to the zone containing the destination addre

• The destination address is in a different zone from the source address.

• The destination address is in the same zone as the source address, and intr

Configuring the VPN Monitoring FeatureTo enable VPN monitoring, do the following:

WebUIVPNs > AutoKey IKE > New: Configure the VPN, click Advanced , enter theback to the basic VPN configuration page, and then click OK:

VPN Monitor: Select to enable VPN monitorin

Source Interface: Choose an interface from th“default”, the NetScreen device uses the ou

Destination IP: Enter a destination IP addressthe NetScreen device uses the remote gate

Rekey: Select this option if you want the NetSPhase 2 negotiations—and IKE Phase 1 netunnel status changes from up to down. Wh

Note: If the receiving device is a third-party product that does not respond to the ICMdestination to an internal host in the remote peer�s LAN that does respond. The rempolicy permitting the ICMP echo requests to pass through it.

Page 364: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

350

s to set up the tunnel and begin configuring the tunnel.

Screen device to attempt IKE m up to down. When the rekey fter user-generated traffic has the tunnel status changes from

following, click Return to go

g of this VPN tunnel.

e drop-down list. If you choose tgoing interface.

. If you do not enter anything, way IP address.

destination-ip

that determines whether the remote ive unsuccessful ICMP echo requests.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

NetScreen device attempts IKE negotiationVPN monitoring immediately after you finish

Clear this option if you do not want the Netnegotiations if the tunnel status changes frooption is disabled, VPN monitoring begins atriggered IKE negotiations and stops when up to down.

(Or)

VPNs > Manual Key > New: Configure the VPN, click Advanced , enter the back to the basic VPN configuration page, and then click OK:

VPN Monitor: Select to enable VPN monitorin

Source Interface: Choose an interface from th“default”, the NetScreen device uses the ou

Destination IP: Enter a destination IP addressthe NetScreen device uses the remote gate

CLI

set vpnmonitor frequency number8

set vpnmonitor threshold number9

set vpn name_str monitor [ source-interface interface10 [

ip_addr11 ] ] [optimized] [ rekey12 ]save

8. The VPN monitoring frequency is in seconds. The default setting is 10-second intervals.

9. The VPN monitoring threshold number is the consecutive number of successful or unsuccessful ICMP echo requestsgateway is reachable through the VPN tunnel or not. The default threshold is 10 consecutive successful or 10 consecut

10. If you do not choose a source interface, the NetScreen device uses the outgoing interface as the default.

11. If you do not choose a destination IP address, the NetScreen device uses the IP address for the remote gateway.

12. The rekey option is not available for Manual Key VPN tunnels.

Page 365: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

351

N Monitoringdevices (NetScreen-A and (ethernet1) to the Trust zone oring from its Trust zone

.1/24T

/24

, pre-g2-des-sha, and pre-g2-des-md5.

s-md5, nopfs-esp-des-sha, and

1address: 1.1.1.1tible82g4aX: ethernet3

vpn1patible

rc = ethernet1; dst = 10.1.1.5: tunnel.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Specifying Source and Destination Addresses for VPIn this example, you configure an AutoKey IKE VPN tunnel between two NetScreen NetScreen-B). On device A, you set up VPN monitoring from its Trust zone interfaceinterface (10.2.1.1/24) on NetScreen-B. On the NetScreen-B, you set up VPN monitinterface (ethernet1) to a corporate intranet server (10.1.1.5) behind NetScreen-A.

NetScreen-A NetScreen-BZones and Interfaces• ethernet1

- Zone: Trust- IP address: 10.1.1.1/24- Interface mode: NAT

• ethernet3- Zone: Untrust- IP address: 1.1.1.1/24

• ethernet1- Zone: Trust- IP address: 10.2.1- Interface mode: NA

• ethernet3- Zone: Untrust- IP address: 2.2.2.2

Route-Based AutoKey IKE Tunnel Parameters• Phase 1

- Gateway name: gw1- Gateway static IP address: 2.2.2.2- Security level: Compatible*

- Preshared Key: Ti82g4aX- Outgoing interface: ethernet3- Mode: Main

• Phase 2- VPN tunnel name: vpn1- Security level: Compatible†

- VPN Monitoring: src = ethernet1; dst = 10.2.1.1- Bound to interface: tunnel.1

* A Phase 1 security level of Compatible includes these proposals: pre-g2-3des-sha, pre-g2-3des-md5† A Phase 2 security level of Compatible includes these proposals: nopfs-esp-3des-sha, nopfs-esp-3de

nopfs-esp-des-md5.

• Phase 1- Gateway name: gw- Gateway static IP - Proposals: Compa- Preshared Key: Ti- Outgoing interface- Mode: Main

• Phase 2- VPN tunnel name:- Security level: Com- VPN Monitoring: s- Bound to interface

Page 366: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

352

ir Untrust zone, the admins at to zone.

k Apply :

gateway 2.2.2.250o gateway

an use the default source and ly to illustrate how you can

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Because both devices ping from an interface in their Trust zone to an address in theboth ends of the VPN tunnel must define policies permitting pings to pass from zone

WebUI (NetScreen-A)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

NetScreen-A NetScreen-BRoutesTo 0.0.0.0/0, use ethernet3, gateway 1.1.1.250To 10.2.1.0/0, use tunnel.1, no gateway

To 0.0.0.0/0, use ethernet3, To 10.1.1.0/0, use tunnel.1, n

Note: Because both VPN terminators are NetScreen devices in this example, you cdestination addresses for VPN monitoring. The use of other options is included pureconfigure a NetScreen device to use them.

Page 367: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

353

k OK :

K :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > Tunnel IF New: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Trust (trust-vr)

Unnumbered: (select)

Interface: ethernet1(trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Remote_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.1.0/24

Zone: Untrust

Page 368: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

354

name: 2.2.2.2

ttings, and then click Return to on page:

l.1

4

0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway:

Create a Simple Gateway: (select)

Gateway Name: gw1

Type:

Static IP: (select), Address/Host

Preshared Key: Ti82g4aX

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.1.1.0/2

Remote IP / Netmask: 10.2.1.

Service: ANY

VPN Monitor: (select)

Source Interface: ethernet1

Destination IP: 10.2.1.1

Rekey: (clear)

Page 369: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

355

then click OK:

then click OK:

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 10.2.1.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Remote_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 370: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

356

OK :

k Apply :

k OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Remote_LAN

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: Any

Action: Permit

Position at Top: (select)

WebUI (NetScreen-B)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Page 371: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

357

K :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Tunnel IF New: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Trust (trust-vr)

Unnumbered: (select)

Interface: ethernet1(trust-vr)

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Trust_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.2.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Remote_LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway:

Create a Simple Gateway: (select)

Gateway Name: gw1

Page 372: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

358

name: 1.1.1.1

ttings, and then click Return to on page:

l.1

4

0/24

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Type:

Static IP: (select), Address/Host

Preshared Key: Ti82g4aX

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 10.2.1.0/2

Remote IP / Netmask: 10.1.1.

Service: ANY

VPN Monitor: (select)

Source Interface: ethernet1

Destination IP: 10.1.1.5

Rekey: (clear)

4. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Page 373: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

359

then click OK:

OK :

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 10.1.1.0/24

Gateway: (select)

Interface: Tunnel.1

Gateway IP Address: 0.0.0.0

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Trust_LAN

Destination Address:

Address Book Entry: (select), Remote_LAN

Service: ANY

Action: Permit

Position at Top: (select)

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Remote_LAN

Destination Address:

Address Book Entry: (select), Trust_LAN

Service: Any

Action: Permit

Position at Top: (select)

Page 374: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

360

ace ethernet3 preshare

2.1.0/24 anyion-ip 10.2.1.1

gateway 1.1.1.2501

N any permitN any permit

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-A)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 natset interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24set interface tunnel.1 zone trustset interface tunnel.1 ip unnumbered interface ethernet1

2. Addressesset address trust Trust_LAN 10.1.1.0/24set address untrust Remote_LAN 10.2.1.0/24

3. VPNset ike gateway gw1 address 2.2.2.2 main outgoing-interf

Ti82g4aX sec-level compatibleset vpn vpn1 gateway gw1 sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 10.1.1.0/24 remote-ip 10.set vpn vpn1 monitor source-interface ethernet1 destinat

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.1.0/24 interface tunnel.

5. Policiesset policy top from trust to untrust Trust_LAN Remote_LAset policy top from untrust to trust Remote_LAN Trust_LAsave

Page 375: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

361

ace ethernet3 preshare

1.1.0/24 anyion-ip 10.1.1.5

gateway 2.2.2.2501

N any permitN any permit

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (NetScreen-B)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.1.1/24set interface ethernet1 natset interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24set interface tunnel.1 zone trustset interface tunnel.1 ip unnumbered interface ethernet1

2. Addressesset address trust Trust_LAN 10.2.1.0/24set address untrust Remote_LAN 10.1.1.0/24

3. VPNset ike gateway gw1 address 1.1.1.1 main outgoing-interf

Ti82g4aX sec-level compatibleset vpn vpn1 gateway gw1 sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 10.2.1.0/24 remote-ip 10.set vpn vpn1 monitor source-interface ethernet1 destinat

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.1.1.0/24 interface tunnel.

5. Policiesset policy top from trust to untrust Trust_LAN Remote_LAset policy top from untrust to trust Remote_LAN Trust_LAsave

Page 376: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

362

of a tunnel might change from e to inactive. Then, when the

and sent through a VPN tunnel and searches for a route with oute, the NetScreen device blic WAN.

rface, you can configure the mplish this, use either of the

stead, bind it to a tunnel zone

l interface, and assign it a high

up to down and the route table lookups find this second route traffic to the second tunnel s the traffic.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Security Consideration for a Route-Based VPN DesignWhen using VPN monitoring with a route-based VPN tunnel configuration, the state up to down. When this occurs, all route table entries referencing that interface changNetScreen device does a route lookup for traffic originally intended to be encrypted bound to that tunnel interface, it bypasses the route referencing the tunnel interface the next longest match. The route that it finds might be the default route. Using this rwould then send the traffic unencrypted out through a non-tunnel interface to the pu

To avoid rerouting traffic originally intended for a tunnel interface to a non-tunnel inteNetScreen device to drop such traffic instead of sending it out unencrypted. To accofollowing work-arounds:

• Decoy Tunnel Interface

1. Create a second tunnel interface, but do not bind it to a VPN tunnel. Inthat is in the same virtual routing domain as the first tunnel interface13.

2. Define a second route to the same destination using this second tunnemetric.

Then, when the state of the functioning tunnel interface changes from entry referencing that interface becomes inactive, all subsequent routeto the nonfunctioning tunnel interface. The NetScreen device forwardsinterface and because it is not bound to a VPN tunnel, the device drop

13. If a tunnel interface is bound to a tunnel zone, its status is always up.

Page 377: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

363

nterfaces and name it, for

t to VR-VPN.

or remote sites that you want to

hat you want encrypted and d traffic from VR-VPN to the

traffic through the tunnel if it is

en device still forwards traffic to inactive and there are no other

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

• Virtual Router for Tunnel Interfaces

1. Create a separate virtual router to use for all routes pointing to tunnel iexample, “VR-VPN”.

2. Create a security zone—named, for example, “VPN zone”—and bind i

3. Bind all tunnel interfaces to the VPN zone, and also put all addresses freach through VPN tunnels in this zone.

4. Configure static routes in all other virtual routers to VR-VPN for traffic tsent through the tunnels. If necessary, define static routes for decrypteother virtual routers. Such routes are necessary to allow inbound VPNinitiated from the remote site.

If the state of a tunnel interface changes from up to down, the NetScreVR-VPN, where—because the state of the route to that interface is nowmatching routes—the NetScreen device drops the traffic.

Page 378: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Monitoring

364

through the use of Simple monitoring MIB notes whether

latency of the reply, and the

nel, the NetScreen device

SHA-1) types

e is also reported in remaining

MIBs, you must import the tension files on the NetScreen

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

SNMP VPN Monitoring Objects and TrapsScreenOS provides the ability to determine the status and condition of active VPNs Network Management Protocol (SNMP) VPN monitoring objects and traps. The VPNeach ICMP echo request elicits a reply, a running average of successful replies, theaverage latency over the last 30 attempts.

By enabling the VPN monitoring feature on an AutoKey IKE or Manual Key VPN tunactivates its SNMP VPN monitoring objects, which include data on the following:

• The total number of active VPN sessions

• The time each session started

• The Security Association (SA) elements for each session:

– ESP encryption (DES or 3DES) and authentication algorithm (MD5 or – AH algorithm type (MD5 or SHA-1)– Key exchange protocol (AutoKey IKE or Manual Key)– Phase 1 authentication method (Preshared Key or certificates)– VPN type (dialup or peer-to-peer)– Peer and local gateway IP addresses– Peer and local gateway IDs– Security Parameter Index (SPI) numbers

• Session status parameters– VPN monitoring status (up or down)– Tunnel status (up or down)– Phase 1 and 2 status (inactive or active)– Phase 1 and 2 lifetime (time in seconds before rekeying; Phase 2 lifetim

bytes before rekeying)

Note: To enable your SNMP manager application to recognize the VPN monitoringNetScreen-specific MIB extension files into the application. You can find the MIB exdocumentation CD that shipped with your NetScreen device.

Page 379: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

365

ific destination to one of a ses two tables: the route table -hop gateway IP address le. With this technique, a single page 366.)

es that you can create, but by d—whichever is lower. For nnels, you can create 1000

pports 8192 routes and 10,000 o a single tunnel interface14. To relevant product data sheet.

rfaces and any other static routes— tunnels.

el interface to as many is lower�can support.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

MULTIPLE TUNNELS PER TUNNEL INTERFACEYou can bind multiple IPSec VPN tunnels to a single tunnel interface. To link a specnumber of VPN tunnels bound to the same tunnel interface, the NetScreen device uand the next-hop tunnel binding (NHTB) table. The NetScreen device maps the nextspecified in the route table entry to a particular VPN tunnel specified in the NHTB tabtunnel interface can support many VPN tunnels. (See “Route-to-Tunnel Mapping” on

The maximum number of VPN tunnels is not limited by the number of tunnel interfaceither route table capacity or the maximum number of dedicated VPN tunnels alloweinstance, if your NetScreen device supports 4000 routes and 1000 dedicated VPN tuVPN tunnels and bind them to a single tunnel interface. If your NetScreen device sudedicated VPN tunnels, then you can create over 8000 VPN tunnels and bind them tsee the maximum route and tunnel capacities for your NetScreen device, refer to the

14. If route table capacity is the limiting factor, you must subtract the routes automatically generated by security zone intesuch as the route to the default gateway—that you might need to define from the total available for route-based VPN

The NetScreen device can sort VPN traffic sent through a single tunnVPN tunnels as the route table or VPN tunnel capacity�whichever

Route-based VPN tunnels to multiple remote peers.

All tunnels share the same tunnel interface.

Local NetScreen Device

Page 380: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

366

etScreen device maps the . The mapping of entries in the the local NetScreen device hrough vpn2.

10.1.1.5

10.1.1.0/24

namically assigned ed tunnel interface ected LANs

Flagstatic

static

static

inding Table

op IP address in the nd consequently the cified IP-prefix.

he two IKE peers esses and automatically bindings. Optionally, you next-hop IP address is ace IP address.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Route-to-Tunnel MappingTo sort traffic among multiple VPN tunnels bound to the same tunnel interface, the Nnext-hop gateway IP address specified in the route to a particular VPN tunnel nameroute table to entries in the NHTB table is shown below. In the following illustration, routes traffic sent from 10.2.1.5 to 10.1.1.5 through the tunnel.1 interface and then t

vpn2

vpn3

vpn1tunnel.1

10.2.0.0/16

10.2.1.5

10.1.0.0/24

10.1.2.0/24

10.1.1.1

10.1.2.1

Trust Zone LAN

10.1.3.1

Local NetScreen device with multiple tunnels bound to the tunnel.1 interface

Remote VPN peers�with dyexternal IP addresses and fixIP addresses�and their prot

ID IP-Prefix (Dst) Interface Gateway Next-Hop VPN1 10.1.0.0/24 tunnel.1 10.1.1.1 10.1.1.1 vpn1

2 10.1.1.0/24 tunnel.1 10.1.2.1 10.1.2.1 vpn23 10.1.2.0/24 tunnel.1 10.1.3.1 10.1.3.1 vpn3

Route Table Next-Hop Tunnel B

In the above entries, the IP address for the gateway in the route table, which is also the next-hNHTB table, is the tunnel interface at the remote peer�s site. This IP address links the route�atunnel interface specified in the route�to a particular VPN tunnel for traffic destined to the spe

You can employ a dynamic routing protocol such as Border Gateway Protocol (BGP) to populate the route table automatically, or you can manually enter these routes. The IP address for the gateway is the address of the tunnel interface at the remote peer�s site.

During Phase 2 negotiations, texchange tunnel interface addrenter these next-hop-to-tunnel can manually enter these. Thethe remote peer�s tunnel interf

Page 381: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

367

the gateway and next-hop IP col to enter a route referencing

y. The same IP address must NHTB table. Again, there are to obtain it from the remote

next-hop IP address in the ponding VPN tunnel. The te with the correct VPN tunnel

PNs must be unique among ddress translation (NAT) for the st also be unique among all plan becomes imperative. The

unnel

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The NetScreen device uses the IP address of the remote peer’s tunnel interface as address. You can enter the route manually, or you can allow a dynamic routing protothe peer’s tunnel interface IP address as the gateway in the route table automaticallalso be entered as the next hop, along with the appropriate VPN tunnel name, in thetwo options: you can either enter it manually, or you can allow the NetScreen devicepeer during Phase 2 negotiations and enter it automatically.

The NetScreen device uses the gateway IP address in the route table entry and the NHTB table entry as the common element to link the tunnel interface with the corresNetScreen device can then direct traffic destined for the IP-prefix specified in the rouspecified in the NHTB table.

Remote Peers� AddressesThe internal addressing scheme for all remote peers reached through route-based Veach other. One way to accomplish this is for each remote peer to perform network asource and destination addresses. In addition, the tunnel interface IP addresses muremote peers. If you intend to connect to large numbers of remote sites, an addressfollowing is a possible addressing plan for up to 1000 VPN tunnels:

Dst in Local Route Table

Local Tunnel Interface Gateway/Next-Hop(Peer�s Tunnel Interface)

VPN T

10.0.3.0/24 tunnel.1 10.0.2.1/24 vpn1

10.0.5.0/24 tunnel.1 10.0.4.1/24 vpn2

10.0.7.0/24 tunnel.1 10.0.6.1/24 vpn3

� � � �

10.0.251.0/24 tunnel.1 10.0.250.1/24 vpn125

10.1.3.0/24 tunnel.1 10.1.2.1/24 vpn126

10.1.5.0/24 tunnel.1 10.1.4.1/24 vpn127

Page 382: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

368

sts, there is a tunnel interface oute table and NHTB table.

ddress translation, see 372.

0

unnel

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The tunnel interface on the local NetScreen device: is 10.0.0.1/24. On all remote howith an IP address, which appears as the gateway/next-hop IP address in the local r

For an example illustrating multiple tunnels bound to a single tunnel interface with a“Example: Multiple VPNs on One Tunnel Interface to Overlapping Subnets” on page

10.1.7.0/24 tunnel.1 10.1.6.1/24 vpn128

� � � �

10.1.251.0/24 tunnel.1 10.1.250.1/24 vpn250

10.2.3.0/24 tunnel.1 10.2.2.1/24 vpn251

� � � �

10.2.251.0/24 tunnel.1 10.2.250.1/24 vpn375

� � � �

10.7.3.0/24 tunnel.1 10.7.2.1/24 vpn876

� � � �

10.7.251.0/24 tunnel.1 10.7.250.1/24 vpn100

Dst in Local Route Table

Local Tunnel Interface Gateway/Next-Hop(Peer�s Tunnel Interface)

VPN T

Page 383: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

369

te the populating of the NHTB e manual method works well. nd maintenance as the routes rface at the hub site.

rface in the next-hop tunnel ress used for the tunnel

tunnel name in the NHTB table

7.250.1/24t 10.7.251.1 -> l IP addresses

10.6.2.1/24NAT-dst 10.6.3.1->

internal IP addresses

10.1.1.1/24NAT-dst 10.1.2.1 -> internal IP addresses

10.0.6.1/24NAT-dst 10.0.7.1 -> nternal IP addresses

n751

vpn251

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Manual and Automatic Table EntriesYou can make entries in the NHTB and route tables manually. You can also automaand route tables. For a small number of tunnels bound to a single tunnel interface, thFor a large number of tunnels, the automatic method reduces administrative setup adynamically self-adjust if tunnels or interfaces become unavailable on the tunnel inte

Manual Table EntriesYou can manually map a VPN tunnel to the IP address of a remote peer’s tunnel intebinding (NHTB) table. First, you must contact the remote admin and learn the IP addinterface at that end of a tunnel. Then, you can associate that address with the VPNwith the following command:

set interface tunnel.1 nhtb peer�s_tunnel_interface_addr vpn name_str

Local NetScreen Device10.0.0.1/24

NAT-dst 10.0.1.1 ->internal IP addresses

10.NAT-dsinterna

i

10.0.4.1/24NAT-dst 10.0.5.1 -> internal IP addresses

IF 10.0.2.1/24NAT-dst 10.0.3.1 -> internal IP addresses

vpn1000

vp

vpn3vpn2

vpn1

The local NetScreen device and all its peers perform NAT-dst with IP shifting on inbound VPN traffic and NAT-src from the egress tunnel interface IP address with port translation on outbound VPN traffic. For more information about NAT-src and NAT-dst, see Volume 7, �Address Translation�.

Page 384: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

370

e IP address as the gateway. and:

unnel_interface_addr

conditions must be met:

must be NetScreen devices

e must have an IP address

on, or enable the IKE heartbeat

tocol16 enabled on their

th ends of a tunnel to set up the onitoring with the rekey option

se 2 IKE negotiations to

dresses with each other. Each esponding VPN tunnel name in

negotiations even without enabling ends that you not rely on dynamic nnect option.

nterface before you enable the routing

d to a dynamic IP address, the remote remote peer’s dynamically assigned

ed from up to down.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

After that, you can enter a static route in the route table that uses that tunnel interfacYou can enter the route either through the WebUI or through the following CLI comm

set vrouter name-str route dst_addr interface tunnel.1 gateway peer�s_t

Automatic Table EntriesTo make the population of both the NHTB and route tables automatic, the following

• The remote peers for all VPN tunnels bound to a single local tunnel interfacerunning ScreenOS 5.0.0.

• Each remote peer must bind its tunnel to a tunnel interface, and that interfacunique among all peer tunnel interface addresses.

• At both ends of each VPN tunnel, enable VPN monitoring with the rekey optireconnect option for each remote gateway15.

• The local and remote peers must have an instance of a dynamic routing proconnecting tunnel interfaces.

The use of VPN monitoring with the rekey option allows the NetScreen devices at botunnel without having to wait for user-originated VPN traffic17. After you enable VPN mat both ends of a VPN tunnel, the two NetScreen devices perform Phase 1 and Phaestablish the tunnel. (For more information, see “VPN Monitoring” on page 345.)

During Phase 2 negotiations, the NetScreen devices exchange tunnel interface IP adIKE module can then automatically enter the tunnel interface IP address and its corrthe NHTB table.

15. If you are running a dynamic routing protocol on the tunnel interfaces, traffic generated by the protocol can trigger IKEVPN monitoring with the rekey option or enabling the IKE heartbeat reconnect option. Still, Juniper Networks recommrouting traffic to trigger IKE negotiations. Instead use VPN monitoring with the rekey option or the IKE heartbeat reco

16. For Open Shortest Path First (OSPF), you must configure the tunnel interface on the local peer as a point-to-multipoint iprotocol on the interface.

17. For remote peers with a dynamically assigned external IP address or with a fully-qualified domain name (FQDN) mappepeer must first initiate IKE negotiations. However, because the Phase 2 SA on the local NetScreen device caches theIP address, either peer can reinitiate IKE negotiations to reestablish a tunnel whose VPN monitoring state has chang

Page 385: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

371

ically in its route table, you must s are as follows:

interface to which you have

.

each peer’s tunnel interface IP e to reach its BGP neighbors

so that they can each between themselves, the When the dynamic routing el interface, it includes the IP

nel interface where the “hub” oute and NHTB Table Entries”

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To enable the local NetScreen device to enter routes to remote destinations automatenable an instance of BGP on the local and remote tunnel interfaces. The basic step

1. Create a BGP routing instance on the virtual router that contains the tunnel bound multiple VPN tunnels.

2. Enable the routing instance on the virtual router.

3. Enable the routing instance on the tunnel interface leading to the BPG peers

The remote peers also perform these steps.

On the local (or hub) device, you must also define a default route and a static route toaddress. Static routes to the peers’ tunnel interfaces are necessary for the hub devicinitially through the correct VPN tunnel.

After establishing communications, the BGP neighbors exchange routing informationautomatically populate their route tables. After the two peers establish a VPN tunnelremote peers can send and receive routing information to and from the local device.instance on the local NetScreen device learns a route to a peer through a local tunnaddress of the remote peer’s tunnel interface as the gateway in the route.

For an example illustrating the configuration of multiple tunnels bound to a single tundevice populates its NHTB and route tables automatically, see “Example: Automatic Ron page 403.

Page 386: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

372

ng Subnets, and vpn3—to a single tunnel r1, peer2, and peer3. You ee peers.

ters: AutoKey IKE, preshared y level predefined as osals, see “Tunnel Negotiation”

ain for that device.

ow you can use source and sing conflicts among IPSec ranslation”.

vpn1IKE gateway: peer1, 2.2.2.2te peer�s tunnel interface: 10.0.2.1

vpn2IKE gateway: peer2, 3.3.3.3

remote peer�s tunnel interface: 10.0.4.1

vpn3IKE gateway: peer3, 4.4.4.4

ote peer�s tunnel interface: 10.0.6.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Multiple VPNs on One Tunnel Interface to OverlappiIn this example, you bind three route-based AutoKey IKE VPN tunnels—vpn1, vpn2interface—tunnel.1. The tunnels lead from NetScreen-A to three remote peers—peemanually add both the route table and NHTB table entries on NetScreen-A for all thr

The VPN tunnel configurations at both ends of each tunnel use the following paramekey (peer1: “netscreen1”, peer2: “netscreen2”, peer3: “netscreen3”), and the securit“Compatible” for both Phase 1 and Phase 2 proposals. (For details about these propon page 11.)

All security zones and interfaces on each device are in the trust-vr virtual routing dom

This example uses the same address space—10.1.1.0/24—for every LAN to show hdestination network address translation (NAT-src and NAT-dst) to overcome addrespeers. For more information about NAT-src and NAT-dst, see Volume 7, “Address T

tunnel.110.0.0.1/30DIP Pool 5:

10.0.0.2 - 10.0.0.2

vpn2

vpn3

vpn1

peer1

LAN

peer2

peer3

LAN

LAN

ethernet31.1.1.1/24

external router1.1.1.250

Untrust Zone

The tunnel.1 interface on NetScreen-A is bound to three VPN tunnels.

NetScreen-A

Trust Zoneethernet1

10.1.1.1/24

remoNote: The Trust zone for NetScreen-A is not shown.

rem

Page 387: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

373

k Apply :

k OK:

K:

and then click OK :

.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (NetScreen-A)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.0.0.1/30

Network > Interfaces > Edit (for tunnel.1) > DIP > New: Enter the following,

ID: 5

IP Address Range: (select), 10.0.0.2 ~ 10.0.0

Port Translation: (select)

In the same subnet as the interface IP or its s

Page 388: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

374

(select)

e: 2.2.2.2

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: oda1

IP Address/Domain Name:

IP/Netmask: (select), 10.0.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: peers

IP Address/Domain Name:

IP/Netmask: (select), 10.0.0.0/16

Zone: Untrust

3. VPNsVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: peer1

Type: Static IP: (select), Address/Hostnam

Page 389: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

375

ttings, and then click Return to on page:

l.1

/0

(select)

e: 3.3.3.3

ttings, and then click Return to on page:

l.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: peer2

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Page 390: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

376

/0

(select)

e: 4.4.4.4

ttings, and then click Return to on page:

l.1

/0

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Remote IP / Netmask: 0.0.0.0

Service: ANY

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn3

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: peer3

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen3

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Page 391: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

377

nd then click OK :

nd then click OK :

nd then click OK :

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.1.0/24

Gateway: (select)

Interface: ethernet1

Gateway IP Address: 0.0.0.0

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.3.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.2.1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.2.2/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.2.1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.5.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.4.1

Page 392: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

378

nd then click OK :

nd then click OK :

nd then click OK :

, and then click Add :

hen click Add :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.4.2/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.4.1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.7.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.6.1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.6.2/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 10.0.6.1

Network > Interfaces > Edit (for tunnel.1) > NHTB > New: Enter the following

New Next Hop Entry:

IP Address: 10.0.2.1

VPN: vpn1

Network > Interfaces > Edit (for tunnel.1) > NHTB: Enter the following, and t

New Next Hop Entry:

IP Address: 10.0.4.1

VPN: vpn2

Page 393: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

379

hen click Add :

OK :

ttings, and then click Return to e:

0.2)/X-late

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for tunnel.1) > NHTB: Enter the following, and t

New Next Hop Entry:

IP Address: 10.0.6.1

VPN: vpn3

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book: (select), corp

Destination Address:

Address Book: (select), peers

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:Source Translation: (select)

DIP On: 5 (10.0.0.2–10.0.

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), peers

Destination Address:

Address Book Entry: (select), oda1

Service: Any

Action: Permit

Page 394: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

380

ttings, and then click Return to e:

ct)

lect), 10.1.1.0 - 10.1.1.254

ethernet3 preshare

.0/0 any ethernet3 preshare

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP Range: (se

CLI (NetScreen-A)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24set interface tunnel.1 zone untrustset interface tunnel.1 ip 10.0.0.1/30set interface tunnel.1 dip 5 10.0.0.2 10.0.0.2

2. Addressesset address trust corp 10.1.1.0/24set address trust oda1 10.0.1.0/24set address untrust peers 10.0.0.0/16

3. VPNsset ike gateway peer1 address 2.2.2.2 outgoing-interface

netscreen1 sec-level compatibleset vpn vpn1 gateway peer1 sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0set ike gateway peer2 address 3.3.3.3 outgoing-interface

netscreen2 sec-level compatible

Page 395: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

381

.0/0 any ethernet3 preshare

.0/0 any

gateway 1.1.1.250t11 gateway 10.0.2.11 gateway 10.0.2.11 gateway 10.0.4.11 gateway 10.0.4.11 gateway 10.0.6.11 gateway 10.0.6.1

dip-id 5 permitip 10.1.1.0 10.1.1.254

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

set vpn vpn2 gateway peer2 sec-level compatibleset vpn vpn2 bind interface tunnel.1set vpn vpn2 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0set ike gateway peer3 address 4.4.4.4 outgoing-interface

netscreen3 sec-level compatibleset vpn vpn3 gateway peer3 sec-level compatibleset vpn vpn3 bind interface tunnel.1set vpn vpn3 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.0.1.0/24 interface etherneset vrouter trust-vr route 10.0.3.0/24 interface tunnel.set vrouter trust-vr route 10.0.2.2/32 interface tunnel.set vrouter trust-vr route 10.0.5.0/24 interface tunnel.set vrouter trust-vr route 10.0.4.2/32 interface tunnel.set vrouter trust-vr route 10.0.7.0/24 interface tunnel.set vrouter trust-vr route 10.0.6.2/32 interface tunnel.set interface tunnel.1 nhtb 10.0.2.1 vpn vpn1set interface tunnel.1 nhtb 10.0.4.1 vpn vpn2set interface tunnel.1 nhtb 10.0.6.1 vpn vpn3

5. Policiesset policy from trust to untrust corp peers any nat src set policy from untrust to trust peers oda1 any nat dst

permitsave

Page 396: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

382

peer1 site must enter to create NetScreen device to perform

are in the same address space 6 to translate all internal source rforms NAT-dst on VPN traffic ddress shifting in effect.

k Apply :

ranslation�.

/24

one

ange.0.3.255

NAT-dst from10.0.3.0 � 10.0.3.255

to10.1.1.0 � 10.1.1.255with address shifting

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Peer1

The following configuration is what the remote admin for the NetScreen device at thea VPN tunnel to NetScreen-A at the corporate site. The remote admin configures thesource and destination NAT (NAT-src and NAT-dst) because the internal addressesas those in the corporate LAN: 10.1.1.0/24. Peer1 performs NAT-src using DIP pool addresses to 10.0.2.2 when sending traffic through VPN1 to NetScreen-A. Peer1 pesent from NetScreen-A, translating addresses from 10.0.3.0/24 to 10.1.1.0/24 with a

WebUI (Peer1)

1. Interfaces

Network > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Note: For more information about NAT-src and NAT-dst, see Volume 7, �Address T

Peer1Untrust Zone

LAN10.1.1.0

Trust Z

ethernet32.2.2.2/24

external router2.2.2.250

tunnel.1010.0.2.1/30DIP Pool 6

10.0.2.2 - 10.0.2.2

vpn1 from NetScreen-A

NAT-dst R10.0.3.0 � 10

ethernet110.1.1.1/24

Page 397: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

383

k OK:

K:

, and then click OK:

.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.10

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.0.2.1/30

Network > Interfaces > Edit (for tunnel.10) > DIP > New: Enter the following

ID: 6

IP Address Range: (select), 10.0.2.2 ~ 10.0.2

Port Translation: (select)

In the same subnet as the interface IP or its s

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: lan

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Page 398: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

384

(select)

e: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: oda2

IP Address/Domain Name:

IP/Netmask: (select), 10.0.3.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: to_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.1.0/24

Zone: Untrust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: fr_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.0.2/32

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Page 399: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

385

ttings, and then click Return to on page:

l.10

/0

nd then click OK :

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Metric: 1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.3.0/24

Gateway: (select)

Interface: ethernet1

Gateway IP Address: 0.0.0.0

Metric: 1

Page 400: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

386

nd then click OK :

OK :

ttings, and then click Return to e:

ct)

lect), 10.1.1.0 - 10.1.1.254

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.0.0/8

Gateway: (select)

Interface: tunnel.10

Gateway IP Address: 0.0.0.0

Metric: 10

5. PoliciesPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), fr_corp

Destination Address:

Address Book Entry: (select), oda2

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP Range: (se

Page 401: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

387

OK :

ttings, and then click Return to e:

2.2)/X-late

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), lan

Destination Address:

Address Book Entry: (select), to_corp

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Source Translation: (select)

DIP On: 6 (10.0.2.2–10.0.

Page 402: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

388

ethernet3 preshare

.0/0 any

eway 2.2.2.250 metric 1etric 1tric 10

dip-id 6 permitt ip 10.1.1.0

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Peer1)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24set interface tunnel.10 zone untrustset interface tunnel.10 ip 10.0.2.1/30set interface tunnel.10 dip 6 10.0.2.2 10.0.2.2

2. Addressesset address trust lan 10.1.1.0/24set address trust oda2 10.0.3.0/24set address untrust to_corp 10.0.1.0/24set address untrust fr_corp 10.0.0.2/32

3. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen1 sec-level compatibleset vpn vpn1 gateway corp sec-level compatibleset vpn vpn1 bind interface tunnel.10set vpn vpn1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3 gatset vrouter trust-vr route 10.0.3.0/24 interface ethernet1 mset vrouter trust-vr route 10.0.0.0/8 interface tunnel.10 me

5. Policiesset policy from trust to untrust lan to_corp any nat srcset policy from untrust to trust fr_corp oda2 any nat ds

10.1.1.254 permitsave

Page 403: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

389

peer2 site must enter to create NetScreen device to perform

are in the same address space 7 to translate all internal source rforms NAT-dst on VPN traffic ddress shifting in effect.

k Apply :

ranslation�.

0/24

one

NAT-dst from10.0.5.0 � 10.0.5.255

to10.1.1.0 � 10.1.1.255with address shifting

Range10.0.5.255

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Peer2

The following configuration is what the remote admin for the NetScreen device at thea VPN tunnel to NetScreen-A at the corporate site. The remote admin configures thesource and destination NAT (NAT-src and NAT-dst) because the internal addressesas those in the corporate LAN: 10.1.1.0/24. Peer2 performs NAT-src using DIP pool addresses to 10.0.4.2 when sending traffic through VPN2 to NetScreen-A. Peer2 pesent from NetScreen-A, translating addresses from 10.0.5.0/24 to 10.1.1.0/24 with a

WebUI (Peer2)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Note: For more information about NAT-src and NAT-dst, see Volume 7, �Address T

Peer2

ethernet110.1.1.1/24

Untrust Zone

LAN10.1.1.

Trust Z

vpn2 from NetScreen-A

NAT-dst10.0.5.0 �

ethernet33.3.3.3/24

external router3.3.3.250

tunnel.2010.0.4.1/30DIP Pool 7

10.0.4.2 - 10.0.4.2

Page 404: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

390

k OK:

K:

, and then click OK:

.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 3.3.3.3/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.20

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.0.4.1/30

Network > Interfaces > Edit (for tunnel.20) > DIP > New: Enter the following

ID: 7

IP Address Range: (select), 10.0.4.2 ~ 10.0.4

Port Translation: (select)

In the same subnet as the interface IP or its s

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: lan

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Page 405: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

391

(select)

e: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: oda3

IP Address/Domain Name:

IP/Netmask: (select), 10.0.5.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: to_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.1.0/24

Zone: Untrust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: fr_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.0.2/32

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Page 406: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

392

ttings, and then click Return to on page:

l.20

/0

nd then click OK :

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 3.3.3.250

Metric: 1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.5.0/24

Gateway: (select)

Interface: ethernet1

Gateway IP Address: 0.0.0.0

Metric: 1

Page 407: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

393

nd then click OK :

OK :

ttings, and then click Return to e:

4.2)/X-late

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.1.0/24

Gateway: (select)

Interface: tunnel.20

Gateway IP Address: 0.0.0.0

Metric: 10

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), lan

Destination Address:

Address Book Entry: (select), to_corp

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Source Translation: (select)

DIP On: 7 (10.0.4.2–10.0.

Page 408: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

394

OK :

ttings, and then click Return to e:

ct)

lect), 10.1.1.0 - 10.1.1.254

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), fr_corp

Destination Address:

Address Book Entry: (select), oda3

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP Range: (se

Page 409: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

395

ethernet3 preshare

.0/0 any

eway 3.3.3.250 metric 1etric 1tric 10

dip-id 7 permitt ip 10.1.1.0

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Peer2)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 3.3.3.3/24set interface tunnel.20 zone untrustset interface tunnel.20 ip 10.0.4.1/30set interface tunnel.20 dip 7 10.0.4.2 10.0.4.2

2. Addressesset address trust lan 10.1.1.0/24set address trust oda3 10.0.5.0/24set address untrust to_corp 10.0.1.0/24set address untrust fr_corp 10.0.0.2/32

3. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen2 sec-level compatibleset vpn vpn2 gateway corp sec-level compatibleset vpn vpn2 bind interface tunnel.20set vpn vpn2 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3 gatset vrouter trust-vr route 10.0.5.0/24 interface ethernet1 mset vrouter trust-vr route 10.0.0.0/8 interface tunnel.20 me

5. Policiesset policy from trust to untrust lan to_corp any nat srcset policy from untrust to trust fr_corp oda3 any nat ds

10.1.1.254 permitsave

Page 410: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

396

peer3 site must enter to create NetScreen device to perform

are in the same address space 8 to translate all internal source rforms NAT-dst on VPN traffic ddress shifting in effect.

k Apply :

/24

ne

ange.0.7.255

NAT-dst from10.0.7.0 � 10.0.7.255

to10.1.1.0 � 10.1.1.255with address shifting

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Peer3

The following configuration is what the remote admin for the NetScreen device at thea VPN tunnel to NetScreen-A at the corporate site. The remote admin configures thesource and destination NAT (NAT-src and NAT-dst) because the internal addressesas those in the corporate LAN: 10.1.1.0/24. Peer3 performs NAT-src using DIP pool addresses to 10.0.6.2 when sending traffic through VPN3 to NetScreen-A. Peer3 pesent from NetScreen-A, translating addresses from 10.0.7.0/24 to 10.1.1.0/24 with a

WebUI (Peer3)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Note: For more information about NAT-dst, see Volume 7, �Address Translation�.

Peer3

ethernet110.1.1.1/24Untrust Zone

LAN10.1.1.0

Trust Zovpn3 from

NetScreen-A

NAT-dst R10.0.7.0 � 10

ethernet34.4.4.4/24

external router4.4.4.250

tunnel.3010.0.6.1/30DIP Pool 8

10.0.6.2 - 10.0.6.2

Page 411: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

397

k OK:

K:

g, and then click OK:

.2

econdary IPs: (select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 4.4.4.4/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.30

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.0.6.1/30

Network > Interfaces > Edit (for tunnel.320) > DIP > New: Enter the followin

ID: 7

IP Address Range: (select), 10.0.6.2 ~ 10.0.6

Port Translation: (select)

In the same subnet as the interface IP or its s

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: lan

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Trust

Page 412: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

398

(select)

e: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: oda4

IP Address/Domain Name:

IP/Netmask: (select), 10.0.7.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: to_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.1.0/24

Zone: Untrust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: fr_corp

IP Address/Domain Name:

IP/Netmask: (select), 10.0.0.2/32

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn3

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen3

Page 413: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

399

ttings, and then click Return to on page:

l.30

/0

nd then click OK :

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 4.4.4.250

Metric: 1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.7.0/24

Gateway: (select)

Interface: ethernet1

Gateway IP Address: 0.0.0.0

Metric: 1

Page 414: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

400

nd then click OK :

OK :

ttings, and then click Return to e:

6.2)/X-late

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.0.0.0/8

Gateway: (select)

Interface: tunnel.20

Gateway IP Address: 10.0.0.1

Metric: 10

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), lan

Destination Address:

Address Book Entry: (select), to_corp

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Source Translation: (select)

DIP On: 8 (10.0.6.2–10.0.

Page 415: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

401

OK :

ttings, and then click Return to e:

ct)

lect), 10.1.1.0 - 10.1.1.254

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Policies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), fr_corp

Destination Address:

Address Book Entry: (select), oda4

Service: Any

Action: Permit

Position at Top: (select)

> Advanced: Enter the following advanced sereturn to the basic Policy configuration pag

NAT:

Destination Translation: (sele

Translate to IP Range: (se

Page 416: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

402

ethernet3 preshare

.0/0 any

eway 3.3.3.250 metric 1etric 1tric 10

dip-id 8 permitt ip 10.1.1.0

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Peer3)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet3 zone untrustset interface ethernet3 ip 4.4.4.4/24set interface tunnel.30 zone untrustset interface tunnel.30 ip 10.0.6.1/30set interface tunnel.30 dip 8 10.0.6.2 10.0.6.2

2. Addressesset address trust lan 10.1.1.0/24set address trust oda4 10.0.7.0/24set address untrust to_corp 10.0.1.0/24set address untrust fr_corp 10.0.0.2/32

3. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen3 sec-level compatibleset vpn vpn3 gateway corp sec-level compatibleset vpn vpn3 bind interface tunnel.30set vpn vpn3 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3 gatset vrouter trust-vr route 10.0.7.0/24 interface ethernet1 mset vrouter trust-vr route 10.0.0.0/8 interface tunnel.30 me

5. Policiesset policy from trust to untrust lan to_corp any nat srcset policy from untrust to trust fr_corp oda4 any nat ds

10.1.1.254 permitsave

Page 417: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

403

to a single tunnel interface—rotects has multiple routes unicate their routes to

creen-A to the peer sites.

ting protocol in this example. r the OSPF configurations.

?

?

?

?

The routes behind each peer are unknown to NetScreen-A until the peers use BGP to send them.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Automatic Route and NHTB Table EntriesIn this example, you bind two route-based AutoKey IKE VPN tunnels—vpn1, vpn2—tunnel.1 on NetScreen-A at the corporate site. The network that each remote peer pbehind the connected route. Using Border Gateway Protocol (BGP), the peers commNetScreen-A. This example permits VPN traffic from the corporate site behind NetS

Note: You can also use Open Shortest Path First (OSPF) instead of BGP as the rouSee �Example Addendum: OSPF for Automatic Route Table Entries� on page 421 fo

tunnel.110.0.0.1/30

peer1

peer2

?

ethernet31.1.1.1/24

external router1.1.1.250

Untrust Zone

The tunnel.1 interface on NetScreen-A is bound to two VPN tunnels.

NetScreen-A

Trust Zoneethernet1

10.1.1.1/24

Note: The Trust zone for NetScreen-A is not shown.

?vpn2

vpn1

vpn1IKE gateway: peer1, 2.2.2.2

remote peer�s tunnel interface: 2.3.3.1

vpn2IKE gateway: peer2, 3.3.3.3

remote peer�s tunnel interface: 3.4.4.1

Page 418: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

404

ters: AutoKey IKE, preshared “Compatible” for both Phase 1 ” on page 11.)

ts NHTB and route tables

n)19

nel, NetScreen-A establishes a te finish configuring the tunnel. During Phase 2 negotiations, n-A can automatically make a

he devices automatically onitoring with the rekey option

when there is no that you and the remote admins ing information to NetScreen-A ugh the VPN tunnel before

ill need to enter a single static spective site.)

rs through the correct VPN uting domain for that device.

negotiations even without enabling ends that you not rely on dynamic nnect option.

abling VPN monitoring with the rekey traffic to trigger IKE negotiations.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The VPN tunnel configurations at both ends of each tunnel use the following paramekey (peer1: “netscreen1”, peer2: “netscreen2”), and the security level predefined as and Phase 2 proposals. (For details about these proposals, see “Tunnel Negotiation

By configuring the following two features, you can enable NetScreen-A to populate iautomatically18:

• VPN monitoring with the rekey option (or the IKE heartbeats reconnect optio

• BGP dynamic routing on tunnel.1

When you enable VPN monitoring with the rekey option for an AutoKey IKE VPN tunVPN connection with its remote peer as soon as you and the admin at the remote siThe devices do not wait for user-generated VPN traffic to perform IKE negotiations. the NetScreen devices exchange their tunnel interface IP address, so that NetScreeVPN-to-next-hop mapping in its NHTB table.

The rekey option ensures that when the Phase 1 and Phase 2 key lifetimes expire, tnegotiate the generation of new keys without the need for human intervention. VPN menabled essentially provides a means for keeping a VPN tunnel up continually, evenuser-generated traffic. This is necessary so that the BGP dynamic routing instances create and enable on the tunnel interfaces at both ends of the tunnels can send routand automatically populate its route table with the routes it needs to direct traffic throthose routes are required for user-generated traffic. (The admins at the peer sites stroute to the rest of the virtual private network through the tunnel interface at each re

You enter a default route and static routes on NetScreen-A to reach its BGP neighbotunnels. All security zones and interfaces on each device are in the trust-vr virtual ro

18. If you are running a dynamic routing protocol on the tunnel interfaces, traffic generated by the protocol can trigger IKEVPN monitoring with the rekey option or enabling the IKE heartbeat reconnect option. Still, Juniper Networks recommrouting traffic to trigger IKE negotiations. Instead use VPN monitoring with the rekey option or the IKE heartbeat reco

19. If you are running BGP on the tunnel interfaces, the BGP-generated traffic can trigger IKE negotiations even without enoption or enabling the IKE heartbeat reconnect option. Still, Juniper Networks recommends that you not rely on BGPInstead, use VPN monitoring with the rekey option or the IKE heartbeat reconnect option.

Page 419: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

405

k Apply :

k OK:

K:

(select)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (NetScreen-A)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.0.0.1/30

2. VPNsVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Page 420: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

406

e: 2.2.2.2

ttings, and then click Return to on page:

l.1

/0

(select)

e: 3.3.3.3

ee “VPN Monitoring” on page 345.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Gateway Name: peer1

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

VPN Monitor20: (select)

Rekey: (select)

VPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: peer2

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Security Level: Compatible

Outgoing Interface: ethernet3

20. Leave the Source Interface and Destination IP options at their default settings. For information about these options, s

Page 421: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

407

ttings, and then click Return to on page:

l.1

/0

nd then click OK :

nd then click OK :

ee “VPN Monitoring” on page 345.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

VPN Monitor21: (select)

Rekey: (select)

3. Static RouteNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 2.3.3.1/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 2.3.3.1

21. Leave the Source Interface and Destination IP options at their default settings. For information about these options, s

Page 422: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

408

nd then click OK :

nce: Enter the following, and

check box, and then click OK.

> Neighbors: Enter the

> Neighbors: Enter the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 3.4.4.1/32

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 3.4.4.1

4. Dynamic RoutingNetwork > Routing > Virtual Routers > Edit (for trust-vr) > Create BGP Instathen click OK:

AS Number (required): 99

BGP Enabled: (select)

Network > Interfaces > Edit (for tunnel.1) > BGP: Select the Protocol BGP

Network > Routing > Virtual Routers > Edit (for trust-vr) > Edit BGP Instancefollowing, and then click Add:

AS Number: 99

Remote IP: 2.3.3.1

Outgoing Interface: tunnel.1

Network > Routing > Virtual Routers > Edit (for trust-vr) > Edit BGP Instancefollowing, and then click Add:

AS Number: 99

Remote IP: 3.4.4.1

Outgoing Interface: tunnel.1

Page 423: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

409

OK :

ethernet3 preshare

.0/0 any

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PolicyPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book: (select), Any

Destination Address:

Address Book: (select), Any

Service: ANY

Action: Permit

CLI (NetScreen-A)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip 10.0.0.1/30

2. VPNsset ike gateway peer1 address 2.2.2.2 outgoing-interface

netscreen1 sec-level compatibleset vpn vpn1 gateway peer1 sec-level compatibleset vpn vpn1 bind interface tunnel.1set vpn vpn1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0set vpn vpn1 monitor rekey

Page 424: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

410

ethernet3 preshare

.0/0 any

gateway 1.1.1.250 gateway 2.3.3.1 gateway 2.4.4.1

going interface

going interface

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

set ike gateway peer2 address 3.3.3.3 outgoing-interfacenetscreen2 sec-level compatible

set vpn vpn2 gateway peer2 sec-level compatibleset vpn vpn2 bind interface tunnel.1set vpn vpn2 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0set vpn vpn2 monitor rekey

3. Static Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 2.3.3.1/32 interface tunnel.1set vrouter trust-vr route 2.4.4.1/32 interface tunnel.1

4. Dynamic Routingns-> set vrouter trust-vr protocol bgp 99ns-> set vrouter trust-vr protocol bgp enablens-> set interface tunnel.1 protocol bgpns-> set vrouter trust-vrns(trust-vr)-> set protocol bgpns(trust-vr/bgp)-> set neighbor 2.3.3.1 remote-as 99 out

tunnel.1ns(trust-vr/bgp)-> set neighbor 2.3.3.1 enablens(trust-vr/bgp)-> set neighbor 3.4.4.1 remote-as 99 out

tunnel.1ns(trust-vr/bgp)-> set neighbor 3.4.4.1 enablens(trust-vr/bgp)-> exitns(trust-vr)-> exit

5. Policyset policy from trust to untrust any any any permitsave

Page 425: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

411

peer1 site must enter to create NetScreen device to permit ommunicate internal routes to

k OK:

k OK:

one

2.3.

2.3.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Peer1

The following configuration is what the remote admin for the NetScreen device at thea VPN tunnel to NetScreen-A at the corporate site. The remote admin configures theinbound traffic from the corporate site. He also configures the NetScreen device to cits BGP neighbor through vpn1.

WebUI (Peer 1)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 2.3.4.1/24

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Peer1Untrust Zone

2.3.4.0/24

Trust Z

ethernet32.2.2.2/24

external router2.2.2.250

tunnel.102.3.3.1/30

vpn1 from NetScreen-A

ethernet12.3.4.1/24

Page 426: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

412

K:

(select)

e: 1.1.1.1

ttings, and then click Return to on page:

l.10

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.10

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 2.3.3.1/30

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Page 427: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

413

/0

nd then click OK :

nd then click OK :

nce: Enter the following, and

check box, and then click OK.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. Static RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Metric: 1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.1.1.0/24

Gateway: (select)

Interface: tunnel.10

Gateway IP Address: 0.0.0.0

Metric: 1

5. Dynamic RoutingNetwork > Routing > Virtual Routers > Edit (for trust-vr) > Create BGP Instathen click OK:

AS Number (required): 99

BGP Enabled: (select)

Network > Interfaces > Edit (for tunnel.10) > BGP: Select the Protocol BGP

Page 428: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

414

> Neighbors: Enter the

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Virtual Routers > Edit (for trust-vr) > Edit BGP Instancefollowing, and then click Add:

AS Number: 99

Remote IP: 10.0.0.1

Outgoing Interface: tunnel.10

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), corp

Destination Address:

Address Book Entry: (select), Any

Service: ANY

Action: Permit

CLI (Peer1)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 2.3.4.1/24

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.10 zone untrustset interface tunnel.10 ip 2.3.3.1/30

2. Addressset address untrust corp 10.1.1.0/24

Page 429: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

415

ethernet3 preshare

.0/0 any

eway 2.2.2.250 metric 1etric 1

tgoing interface

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen1 sec-level compatibleset vpn vpn1 gateway corp sec-level compatibleset vpn vpn1 bind interface tunnel.10set vpn vpn1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Static Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3 gatset vrouter trust-vr route 10.1.1.0/24 interface tunnel.10 m

5. Dynamic Routingns-> set vrouter trust-vr protocol bgp 99ns-> set vrouter trust-vr protocol bgp enablens-> set interface tunnel.10 protocol bgpns-> set vrouter trust-vrns(trust-vr)-> set protocol bgpns(trust-vr/bgp)-> set neighbor 10.0.0.1 remote-as 99 ou

tunnel.10ns(trust-vr/bgp)-> set neighbor 10.0.0.1 enablens(trust-vr/bgp)-> exitns(trust-vr)-> exit

6. Policyset policy from untrust to trust corp any any permitsave

Page 430: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

416

peer2 site must enter to create NetScreen device to permit ommunicate internal routes to

k OK:

k OK:

st Zone

3.4.

3.4.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Peer2

The following configuration is what the remote admin for the NetScreen device at thea VPN tunnel to NetScreen-A at the corporate site. The remote admin configures theinbound traffic from the corporate site. He also configures the NetScreen device to cits BGP neighbor through vpn2.

WebUI (Peer 2)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 2.3.4.1/24

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 3.3.3.3/24

Peer 2

Untrust Zone3 .4.5.0/24

Tru

ethernet33.3.3.3/24

external router3.3.3.250

tunnel.203.4.4.1/30

vpn2 from NetScreen-A

ethernet13.4.5.1/24

Page 431: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

417

K:

(select)

e: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.20

Zone (VR): Untrust (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 3.4.4.1/30

2. AddressObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24

Zone: Untrust

3. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: vpn2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: corp

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Security Level: Compatible

Outgoing Interface: ethernet3

Page 432: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

418

ttings, and then click Return to on page:

l.20

/0

nd then click OK :

nd then click OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Bind to: Tunnel Interface, tunne

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

4. Static RoutesNetwork > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 3.3.3.250

Metric: 1

Network > Routing > Routing Entries > (trust-vr) New: Enter the following, a

Network Address / Netmask: 10.1.1.0/24

Gateway: (select)

Interface: tunnel.20

Gateway IP Address: 0.0.0.0

Metric: 1

Page 433: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

419

nce: Enter the following, and

check box, and then click OK.

> Neighbors: Enter the

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. Dynamic RoutingNetwork > Routing > Virtual Routers > Edit (for trust-vr) > Create BGP Instathen click OK:

AS Number (required): 99

BGP Enabled: (select)

Network > Interfaces > Edit (for tunnel.20) > BGP: Select the Protocol BGP

Network > Routing > Virtual Routers > Edit (for trust-vr) > Edit BGP Instancefollowing, and then click Add:

AS Number: 99

Remote IP: 10.0.0.1

Outgoing Interface: tunnel.20

6. PolicyPolicies > (From: Untrust, To: Trust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), corp

Destination Address:

Address Book Entry: (select), Any

Service: ANY

Action: Permit

CLI (Peer2)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 3.4.5.1/24

Page 434: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

420

ethernet3 preshare

.0/0 any

eway 3.3.3.250 metric 1etric 1

tgoing interface

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

set interface ethernet3 zone untrustset interface ethernet3 ip 3.3.3.3/24

set interface tunnel.20 zone untrustset interface tunnel.20 ip 3.4.4.1/30

2. Addressset address untrust corp 10.1.1.0/24

3. VPNset ike gateway corp address 1.1.1.1 outgoing-interface

netscreen2 sec-level compatibleset vpn vpn1 gateway corp sec-level compatibleset vpn vpn1 bind interface tunnel.20set vpn vpn1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. Static Routesset vrouter trust-vr route 0.0.0.0/0 interface ethernet3 gatset vrouter trust-vr route 10.1.1.0/24 interface tunnel.20 m

5. Dynamic Routingns-> set vrouter trust-vr protocol bgp 99ns-> set vrouter trust-vr protocol bgp enablens-> set interface tunnel.20 protocol bgpns-> set vrouter trust-vrns(trust-vr)-> set protocol bgpns(trust-vr/bgp)-> set neighbor 10.0.0.1 remote-as 99 ou

tunnel.20ns(trust-vr/bgp)-> set neighbor 10.0.0.1 enablens(trust-vr/bgp)-> exitns(trust-vr)-> exit

6. Policyset policy from untrust to trust corp any any permitsave

Page 435: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

421

unicate routes to NetScreen-A. t configure the tunnel interface

device is shown below.

ance: Select OSPF Enabled,

interface from the Available

hen click Apply :

drop down list

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example Addendum: OSPF for Automatic Route Table EntriesYou can also configure OSPF instead of BGP dynamic routing for the peers to commTo allow tunnel.1 on NetScreen-A to form OSPF adjacencies with its peers, you musas a point-to-multipoint interface. The OSPF dynamic routing configuration for each

WebUI (NetScreen-A)

Dynamic Routing (OSPF)

Network > Routing > Virtual Routers > Edit (for trust-vr) > Create OSPF Instand then click Apply .

Area > Configure (for area 0.0.0.0): Click << Add to move the tunnel.1Interface(s) list to the Selected Interface(s) list, and then click OK .

Network > Interfaces > Edit (for tunnel.1) > OSPF: Enter the following, and t

Bind to Area: (select), Select 0.0.0.0 from the

Protocol OSPF: Enable

Link Type: Point-to-Multipoint (select)

CLI (NetScreen-A)

Dynamic Routing (OSPF)

ns-> set vrouter trust-vr protocol ospfns-> set vrouter trust-vr protocol ospf enablens-> set interface tunnel.1 protocol ospf area 0ns-> set interface tunnel.1 protocol ospf link-type p2mpns-> set interface tunnel.1 protocol ospf enablens-> save

Page 436: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

422

ance: Select OSPF Enabled,

interface from the Available

hen click Apply :

drop down list

ance: Select OSPF Enabled,

interface from the Available

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Peer 1)

Dynamic Routing (OSPF)

Network > Routing > Virtual Routers > Edit (for trust-vr) > Create OSPF Instand then click Apply .

Area > Configure (for area 0.0.0.0): Click << Add to move the tunnel.1Interface(s) list to the Selected Interface(s) list, and then click OK .

Network > Interfaces > Edit (for tunnel.1) > OSPF: Enter the following, and t

Bind to Area: (select), Select 0.0.0.0 from the

Protocol OSPF: Enable

CLI (Peer1)

Dynamic Routing (OSPF)

ns-> set vrouter trust-vr protocol ospfns-> set vrouter trust-vr protocol ospf enablens-> set interface tunnel.1 protocol ospf area 0ns-> set interface tunnel.1 protocol ospf enablens-> save

WebUI (Peer 2)

Dynamic Routing (OSPF)

Network > Routing > Virtual Routers > Edit (for trust-vr) > Create OSPF Instand then click Apply .

Area > Configure (for area 0.0.0.0): Click << Add to move the tunnel.1Interface(s) list to the Selected Interface(s) list, and then click OK .

Page 437: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Multiple Tunnels per Tunnel Interface

423

hen click Apply :

drop down list

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for tunnel.1) > OSPF: Enter the following, and t

Bind to Area: (select), Select 0.0.0.0 from the

Protocol OSPF: Enable

CLI (Peer2)

Dynamic Routing (OSPF)

ns-> set vrouter trust-vr protocol ospfns-> set vrouter trust-vr protocol ospf enablens-> set interface tunnel.1 protocol ospf area 0ns-> set interface tunnel.1 protocol ospf enablens-> save

Page 438: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

424

onnectivity during and after a dant gateways to which els can connect. When the performs Phase 1 and Phase 2 hrough the VPN tunnel to the e group, the NetScreen device alive packets through them. If e second highest priority in the

-Site Dynamic Peer arrangement, the e the untrust IP addresses of the VPN

nected so that data is mirrored (HA)�has a redundant cluster must be set higher than the

VPN Group, ID 1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

REDUNDANT VPN GATEWAYSThe NetScreen redundant gateway feature provides a solution for continuous VPN csite-to-site failover. You can create a VPN group to provide a set of up to four redunpolicy-based site-to-site or site-to-site dynamic peer AutoKey IKE IPSec22 VPN tunnNetScreen device first receives traffic matching a policy referencing a VPN group, it IKE negotiations with all members in that group. The NetScreen device sends data tgateway with the highest priority, or “weight”, in the group. For all other gateways in thmaintains the Phase 1 and 2 SAs and keeps the tunnels active by sending IKE keepthe active VPN tunnel fails, the tunnel can fail over to the tunnel and gateway with thgroup.

22. VPN groups do not support L2TP, L2TP-over-IPSec, dialup, Manual Key, or route-based VPN tunnel types. In a Site-toNetScreen device monitoring the VPN group must be the one whose untrust IP address is dynamically assigned, whilgroup members must be static.

Note: This scheme assumes that the sites behind the redundant gateways are conamong hosts at all sites. Furthermore, each site�being dedicated to high availabilityof NetScreen devices operating in HA mode. Therefore, the VPN failover threshold device failover threshold or VPN failovers might occur unnecessarily.

= Data= IKE Heartbeats

VPN Group, ID 1(After a VPN Failover)

Page 439: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

425

ways. The Phase 1 and Phase identical (except for the IP has a unique ID number, and f preference to be the active

themselves have a ctivity and wellbeing of each

e might also be a member of a

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPN GroupsA VPN group is a set of VPN tunnel configurations for up to four targeted remote gate2 security association (SA) parameters for each tunnel in a group can be different oraddress of the remote gateway, which obviously must be different). The VPN group each member in the group is assigned a unique weight to indicate its place in rank otunnel. A value of 1 indicates the lowest, or least preferred, ranking.

The NetScreen device communicating with VPN group members and the members monitor-to-target relationship. The monitoring device continually monitors the connetargeted device. The tools that the monitor uses to do this are as follows:

• IKE heartbeats

• IKE recovery attempts

Both tools are presented in the next section, “Monitoring Mechanisms” on page 426.

Note: The monitor-to-target relationship need not be one way. The monitoring devicVPN group and thus be the target of another monitoring device.

VPN Group 1 Weight4

3

2

1

Monitor

T

a

r

g

e

t

s

Note: In this illustration, the shading symbolizes the weight of each tunnel. The darker the tunnel is shaded, the higher its priority.

Page 440: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

426

their ability to terminate VPN

Checking” on page 430), new tunnel without disrupting

tection of an established her. If, for example, device_m om device_t (the “target”), se 1 and Phase 2 security “IKE Recovery Procedure” on

VPN tunnel in a VPN group. If transmission and generates the eer is not sending them.”

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Monitoring MechanismsNetScreen uses two mechanisms to monitor members of a VPN group to determinetraffic:

• IKE heartbeats

• IKE recovery attempts

Using these two tools, plus the TCP application failover option (see “TCP SYN-FlagNetScreen devices can detect when a VPN failover is required and shift traffic to theVPN service.

IKE Heartbeats

IKE heartbeats are hello messages that IKE peers send to each other under the proPhase 1 security association (SA) to confirm the connectivity and wellbeing of the ot(the “monitor”) does not receive a specified number of heartbeats (the default is 5) frdevice_m concludes that device_t is down. Device_m clears the corresponding Phaassociations (SAs) from its SA cache and begins the IKE recovery procedure. (See page 427.) Device_t also clears its SAs.

Note: The IKE heartbeats feature must be enabled on the devices at both ends of ait is enabled on device_m but not on device_t, device_m suppresses IKE heartbeat following message in the event log: �Heartbeats have been disabled because the p

IKE Heartbeats must flow both ways through the VPN tunnel.

Page 441: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

427

fault is 5), do the following:

eartbeat threshold you want to beat Threshold fields, and then

e monitor stops sending IKE al, the monitor attempts to he monitor continues to attempt

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To define the IKE heartbeat interval and threshold for a specified VPN tunnel (the de

WebUI

VPNs > AutoKey Advanced > Gateway > Edit (for the gateway whose IKE hmodify) > Advanced: Enter the new values in the Heartbeat Hello and Heartclick OK .

CLI

set ike gateway name_str heartbeat hello numberset ike gateway name_str heartbeat threshold number

IKE Recovery Procedure

After the monitoring NetScreen device determines that a targeted device is down, thheartbeats and clears the SAs for that peer from its SA cache. After a defined intervinitiate Phase 1 negotiations with the failed peer. If the first attempt is unsuccessful, tPhase 1 negotiations at regular intervals until negotiations are successful.

Page 442: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

428

is 60 seconds), do either of the

econnect interval you want to t field, and then click OK .

group member and then member. The weighting system ver it can do so.

essful Attempt

essful Attempt

ssful Attempt

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

To define the IKE recovery interval for a specified VPN tunnel (the minimum setting following:

WebUI

VPNs > AutoKey Advanced > Gateway > Edit (for the gateway whose IKE rmodify) > Advanced: Enter the value in seconds in the Heartbeat Reconnec

CLI

set ike gateway name_str heartbeat reconnect number

When a VPN group member with the highest weight fails over the tunnel to another reconnects with the monitoring device, the tunnel automatically fails back to the first always causes the best ranking gateway in the group to handle the VPN data whene

Monitor Target

Unsucc

Unsucc

Succe

IKE Phase 1 Negotiation Attempts

Every 5 Minutes

Interval:5 minutes

(300 seconds) ......

...

......

...

Page 443: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

429

goes when the missing

arget

e P1 and tervals.

.

N ).

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The following illustration presents the process that a member of a VPN group underheartbeats from a targeted gateway surpass the failure threshold.

Monitor T

IKE heartbeats flowing in both directions

Target stops sending IKE heartbeats.

Monitor fails over the VPN (if target was handling VPN data), clears thP2 SAs, and attempts to reestablish the VPN tunnel at specified in

Target responds to P1 initiation with IKE heartbeats enabled

IKE P1 and P2 negotiations succeed, tunnel is back up, and VPfails back (if its weight preempts other VPN group members

1.

2.

3.

4.

5.

Page 444: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

430

sed. If, after a failover, the new s it as the first packet in a new cket is really part of an existing he packet. With TCP SYN flag

, as follows:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

TCP SYN-Flag CheckingFor a seamless VPN failover to occur, the handling of TCP sessions must be addresactive gateway receives a packet in an existing TCP session, the new gateway treatTCP session and checks if the SYN flag is set in the packet header. Because this pasession, it does not have the SYN flag set. Consequently, the new gateway rejects tchecking enabled, all TCP applications have to reconnect after the failover occurs.

To resolve this, you can disable SYN-flag checking for TCP sessions in VPN tunnels

WebUI

You cannot disable SYN-flag checking via the WebUI.

CLI

unset flow tcp-syn-check-in-tunnel

Note: By default, SYN-flag checking is enabled.

Page 445: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

431

tunnel to a backup data center. s. The data centers are failure such as an all-day

Trust and Untrust zones, and

tunnels use the security level s authenticate the participants.

ace, Gatewaye)

VPN Group ID and Weight

W) 1.1.1.2 � �

W) 2.2.2.2 ID = 1, Weight = 2

W) 3.3.3.2 ID = 1, Weight =1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Redundant VPN Gateways

In this example, a corporate site has one VPN tunnel to a data center and a second All the data is mirrored via a leased line connection between the two data center sitephysically separate to provide continuous service even in the event of a catastrophicpower outage or a natural disaster.

The device location and name, the physical interfaces and their IP addresses for thethe VPN group ID and weight for each NetScreen device are as follows:

All security zones are in the trust-vr routing domain. All the Site-to-Site AutoKey IKEpredefined as “Compatible” for both Phase 1 and Phase 2 proposals. Preshared key

Device Location

DeviceName

Physical Interface and IP Address

(Trust Zone)

Physical InterfIP Address, Default

(Untrust Zon

Corporate Monitor1 ethernet1, 10.10.1.1/24 ethernet3, 1.1.1.1/24, (G

Data Center (Primary) Target1 ethernet1, 10.1.1.1/16 ethernet3, 2.2.2.1/24, (G

Data Center (Backup) Target2 ethernet1, 10.1.1.1/16 ethernet3, 3.3.3.1/24, (G

Note: The internal address space at both data center sites must be identical.

Page 446: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

432

k Apply :

Data CenterPrimary Site

Data CenterBackup Site

0.1.0.0/16

0.1.0.0/16

Leased line to mirror data from primary site to

backup site

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Monitor1)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.10.1.1/24

Enter the following, and then click OK :

Interface Mode: NAT

Corporate Site

Monitor1

Untrust, eth31.1.1.1/24

Trust, eth110.10.1.1/24

1

Trust, eth110.1.1.1/16

Untrust, eth33.3.3.1/24

Untrust, eth32.2.2.1/24

Trust, eth110.1.1.1/16

1

10.10.1.0/24 Internet

Target1

Target2

Note: Security zones and external routers are not shown in this illustration.

Page 447: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

433

k OK:

, and then click Add.

click OK :

lect), IP Address: 2.2.2.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: in_trust

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.0/24

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: data_ctr

IP Address/Domain Name:

IP/Netmask: (select), 10.1.0.0/16

Zone: Untrust

3. VPNsVPNs > AutoKey Advanced > VPN Group: Enter 1 in the VPN Group ID field

VPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: target1

Security Level: Compatible

Remote Gateway Type: Static IP Address: (se

Preshared Key: SLi1yoo129

Outgoing Interface: ethernet3

Page 448: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

434

ttings, and then click Return to age:

tion)

1

ttings, and then click Return to on page:

click OK :

lect), IP Address: 3.3.3.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Compatible

Mode (Initiator): Main (ID Protec

Heartbeat:

Hello: 3 Seconds

Reconnect: 60 seconds

Threshold: 5

VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: to_target1

Security Level: Compatible

Remote Gateway: Predefined: (select), target

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

VPN Group: VPN Group -1

Weight: 2

VPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: target2

Security Level: Compatible

Remote Gateway Type: Static IP Address: (se

Preshared Key: CMFwb7oN23

Outgoing Interface: ethernet3

Page 449: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

435

ttings, and then click Return to age:

tion)

2

ttings, and then click Return to on page:

then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Compatible

Mode (Initiator): Main (ID Protec

Heartbeat:

Hello: 3 Seconds

Reconnect: 60 seconds

Threshold: 5

VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: to_target2

Security Level: Compatible

Remote Gateway: Predefined: (select), target

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

VPN Group: VPN Group -1

Weight: 1

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.2(untrust)

Page 450: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

436

OK :

lect)

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), in_trust

Destination Address:

Address Book Entry: (select), data_ctr

Service: ANY

Action: Tunnel

VPN: VPN Group -1

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

Page 451: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

437

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Target1)

1. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.1.1.1/16

Enter the following, and then click OK :

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.1/24

2. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: in_trust

IP Address/Domain Name:

IP/Netmask: (select), 10.1.0.0/16

Zone: Trust

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: corp

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.0/24

Zone: Untrust

Page 452: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

438

click OK:

tname: 1.1.1.1

ttings, and then click Return to age:

tion)

or1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPNVPNs > AutoKey Advanced > Gateway > New: Enter the following, and then

Gateway Name: monitor1

Security Level: Compatible

Remote Gateway Type:

Static IP Address: (select), IP Address/Hos

Preshared Key: SLi1yoo129

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic Gateway configuration p

Security Level: Compatible

Mode (Initiator): Main (ID Protec

Heartbeat:

Hello: 3 Seconds

Reconnect: 0 seconds

VPN > AutoKey IKE > New: Enter the following, and then click OK:

Name: to_monitor1

Security Level: Compatible

Remote Gateway: Predefined: (select), monit

Page 453: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

439

then click OK:

k OK:

lect)

e the Untrust zone interface IP CMFwb7oN23 to generate the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. RouteNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.2

5. PoliciesPolicies > ( From: Trust, To: Untrust) New: Enter the following, and then clic

Source Address:

Address Book Entry: (select), in_trust

Destination Address:

Address Book Entry: (select), corp

Service: ANY

Action: Tunnel

Tunnel VPN: monitor1

Modify matching bidirectional VPN policy: (se

Position at Top: (select)

WebUI (Target2)

Note: Follow the Target1 configuration steps to configure Target2, but definaddress as 3.3.3.1/24, the default gateway IP address as 3.3.3.2, and use preshared key.

Page 454: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

440

terface ethernet3

terface ethernet3

gateway 1.1.1.2

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Monitor1)1. Interfaces

set interface ethernet1 zone trustset interface ethernet1 ip 10.10.1.1/24set interface ethernet1 nat

set interface ethernet3 zone untrust set interface ethernet3 ip 1.1.1.1/24

2. Addresses

set address trust in_trust 10.10.1.0/24set address untrust data_ctr 10.1.0.0/16

3. VPNs

set ike gateway target1 address 2.2.2.1 main outgoing-inpreshare SLi1yoo129 sec-level compatible

set ike gateway target1 heartbeat hello 3set ike gateway target1 heartbeat reconnect 60set ike gateway target1 heartbeat threshold 5set vpn to_target1 gateway target1 sec-level compatibleset ike gateway target2 address 3.3.3.1 main outgoing-in

preshare CMFwb7oN23 sec-level compatibleset ike gateway target2 heartbeat hello 3set ike gateway target2 heartbeat reconnect 60set ike gateway target2 heartbeat threshold 5set vpn to_target2 gateway target2 sec-level compatibleset vpn-group id 1 vpn to_target1 weight 2set vpn-group id 1 vpn to_target2 weight 1unset flow tcp-syn-check-in-tunnel

4. Route

set vrouter trust-vr route 0.0.0.0/0 interface ethernet3

Page 455: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

441

ny tunnel “vpn-group 1”ny tunnel “vpn-group 1”

nterface ethernet3

e

gateway 2.2.2.2

unnel vpn to_monitorunnel vpn to_monitor

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. Policies

set policy top from trust to untrust in_trust data_ctr aset policy top from untrust to trust data_ctr in_trust asave

CLI (Target1)

1. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.1.1.1/16set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.1/24

2. Addressesset address trust in_trust 10.1.0.0/16set address untrust corp 10.10.1.0/24

3. VPNset ike gateway monitor1 address 1.1.1.1 main outgoing-i

preshare SLi1yoo129 sec-level compatibleset ike gateway monitor1 heartbeat hello 3set ike gateway monitor1 heartbeat threshold 5set vpn to_monitor1 gateway monitor1 sec-level compatibl

4. Routeset vrouter trust-vr route 0.0.0.0/0 interface ethernet3

5. Policiesset policy top from trust to untrust in_trust corp any tset policy top from untrust to trust corp in_trust any tsave

Page 456: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Redundant VPN Gateways

442

e the Untrust zone interface IP CMFwb7oN23 to generate the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Target2)

Note: Follow the Target1 configuration steps to configure Target2, but definaddress as 3.3.3.1/24, the default gateway IP address as 3.3.3.2, and use preshared key.

Page 457: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Tunnel Failover Behavior

443

ute-based VPNs; however, the n of the virtual router (VR),

creen device encrypts the ute change. For information ge 424.

dynamic routing protocols. As ards packets. If a route change

packets in the same or possibly w remains secure.

the same zone as the bound

nfigure routes to maintain

ation about configuring

e desired route (that is, through table. The NULL route drops references.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

VPN TUNNEL FAILOVER BEHAVIORThe NetScreen device recovers from VPN tunnel failure for both policy-based and rofailover behavior differs slightly depending on the type of VPN and your configuratiozones, and interfaces.

Policy-Based VPN Tunnel RecoveryRoute changes do not affect policy-based VPNs. When a VPN tunnel fails, the NetSpackets as usual and then sends them out. No change occurs with respect to the roabout configuring redundant VPN gateways, see “Redundant VPN Gateways” on pa

Route-Based VPN Tunnel RecoveryYou can route packets through a VPN tunnel with a combination of static routes andlong as no route change occurs, the NetScreen device consistently encrypts and forwoccurs, the NetScreen device can reroute packets in one of two ways:

• Encrypted through another VPN tunnel• Unencrypted out a security zone interface

When the NetScreen device reroutes packets to another VPN tunnel, it encrypts the a different way as the original VPN tunnel and then forwards the packets. Packet flo

Packet encryption can stop, however, if a route change points to the same VR withintunnel interface that failed.

When the NetScreen device reroutes the packet flow out a security zone, you can cosecurity and control the behavior of the tunnel failover in one of these ways:

• You can configure a back-up tunnel to another NetScreen device. For informredundant VPN gateways, see “Redundant VPN Gateways” on page 424.

• You can configure a NULL route (0.0.0.0/0) with a preference greater than ththe failed tunnel) and less than the next best route in the destination routingpackets that the NetScreen device might send unencrypted due to routing p

• You can add a static route to a dial-up or leased line.

Page 458: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Tunnel Failover Behavior

444

rred route.

red NULL el but less e

ial-up or router.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

The following illustration shows two options for handling a failover to clear text.

An example incorporating both options follows this section.

The X signifies a failed VPN tunnel, the prefe

Option 1: The gray line is a manually configuroute with a metric greater than the VPN tunnthan the next best route. This option drops thunencrypted traffic.

Option 2: The black arrow is a static route (dleased line) to another NetScreen device or

Corporate LAN

ISPInternet

Page 459: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Tunnel Failover Behavior

445

the corporate network behind to flow over a leased line to the -A to drop the traffic rather than

erent metric:

sed line (metric = 2)

ich is 1. You assign a metric of in the diagram below). The n device does not use the

n the secondary route fails, the domain.

lude the configuration for other

LAN10.2.2.0/24

Corporate Office

Note: Security zones are not shown in this illustration.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: VPN Failover to Leased Line or Null RouteIn this example, you want traffic from the branch office behind NetScreen-A to reachNetScreen-B over a secure VPN connection. If the tunnel fails, you then want traffic corporate office. If both the VPN tunnel and the leased line fail, you want NetScreensend it out onto the Internet in cleartext.

You create three routes on NetScreen-A to reach 10.2.2.0/24 and assign each a diff

• Preferred Route – use tunnel.1, which is bound to vpn1 (metric = 1)• Secondary Route – use ethernet3 and the gateway at 1.1.1.5 to use the lea• Tertiary Route – use the null interface to drop traffic (metric = 10)

When you create the preferred route, you use the default metric for a static route, wh2 to the secondary route; that is, the backup route over the leased line (shown in redmetric is less than that of the preferred route through the VPN tunnel. The NetScreesecondary route unless the preferred route through the VPN tunnel fails.

Finally, you add a NULL route with a metric of 10. If the preferred route fails and theNetScreen device drops all packets. All the security zones are in the trust-vr routing

Note: This example shows only the configuration for the three routes. It does not incnecessary elements, such as security zones, interfaces, addresses, and policies.

InternetLAN

10.1.1.0/24

Leased Line (Back-Up Route)Gateway: 1.1.1.5/24

ethernet3 1.1.1.1/24

NULL Route

Gateway1.1.1.250

vpn1

tunnel.1

Branch Office

Traffic flows from the branch office to the corporate office.

tunnel.1

ethernet3 2.2.2.2/24

1

23

Route Preferences:1. tunnel.1 -> vpn12. ethernet3 -> leased line3. null interface -> drop

Page 460: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Tunnel Failover Behavior

446

then click OK:

then click OK:

then click OK:

gateway 1.1.1.2501t3 gateway 1.1.1.5

tric 10

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

Network > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address/Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: (select), 2.2.2.250

Network > Routing > Routing Entries > trust-vr New: Enter the following and

Network Address/Netmask: 2.2.2.0/24

Gateway: (select)

Interface: ethernet3

Gateway IP Address: (select) 1.1.1.5

Metric: 2

Network > Routing > Routing Entries > trust-vr New: Enter the following and

Network Address/Netmask: 2.2.2.0/24

Interface: null

Metric: 10

CLI

set vrouter trust-vr route 0.0.0.0/0 interface ethernet3set vrouter trust-vr route 10.2.2.0/24 interface tunnel.set vrouter trust-vr route 10.2.2.0/24 interface etherne

metric 2set vrouter trust-vr route 10.2.2.0/24 interface null mesave

Page 461: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features VPN Tunnel Failover Behavior

447

.

ckets to reach the 10.2.2.0 ugh a gateway at 1.1.1.5. If the NetScreen device drops the

----------

rmanent

----------

tr Vsys

----------

10 Root

2 Root

1 Root

0 Root

0 Root

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

You can verify that the new routes are present by executing the get route command

The route entry with ID 3 is the VPN tunnel and the active and preferred route for panetwork. If that tunnel fails, the next best route is route entry 4 over a leased line throconnection for route entry 4 fails, route entry 5 becomes the next best route, and thetraffic.

ns-> get route

Dest-Routes for <untrust-vr> (0 entries) ----------------------------------------------------------------------

C - Connected S - Static A - Auto-Exported I - Imported R - RIP P - PeiB - IBGP eB - EBGP O - OSPF E1 - OSPF external type 1E2 - OSPF external type 2

Dest-Routes for <trust-vr> (5 entries)----------------------------------------------------------------------

ID IP-Prefix Interface Gateway P Pref M

----------------------------------------------------------------------

5 10.2.2.0/24 null 0.0.0.0 S 20

4 10.2.2.0/24 eth3 1.1.1.5 S 20

* 3 10.2.2.0/24 tunnel.1 0.0.0.0 S 20

* 2 1.1.1.0/24 untrust 1.1.1.250 C 0

* 1 10.1.1.0/24 trust 0.0.0.0 C 0

Page 462: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

448

unnel to another by putting the device at the hub must do a trol the traffic flowing via the VPNs.

interfaces within the same zone.

Spoke B

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

BACK-TO-BACK VPNSYou can enforce interzone policies at the hub site for traffic passing from one VPN tspoke sites in different zones23. Because they are in different zones, the NetScreen policy lookup before routing the traffic from one tunnel to another. Thus you can conVPN tunnels between the spoke sites. Such an arrangement is called back-to-back

23. Optionally, you can enable intrazone blocking and define an intrazone policy to control traffic between the two tunnel

X1Zone

VPN1 VPN2

Back-to-Back VPNs

X2Zone

PolicyLookup

Spoke A

Hub

Page 463: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

449

rimeter site A can link to the nel. Especially for ently, applying the ilities.

een perimeter sites. For

llow any kind of traffic to flow

ic originating from C to reach A.

while allowing only a specific

from all perimeter networks. At ffic through the spoke VPNs to nnel vpn name_str (where b). At the hub, the administrator nly), performing URL blocking

spoke sites in one region to

cept that the NetScreen device the two tunnels to the branch ol the VPN traffic at the hub.

is in the user-defined X2 zone.

key on the NetScreen device.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

A few benefits of back-to-back VPNs:

• You can conserve the number of VPNs you need to create. For example, pehub, and to perimeter sites B, C, D…, but A only has to set up one VPN tunNetScreen-5XP users, who can use a maximum of ten VPN tunnels concurrhub-and-spoke method dramatically increases their VPN options and capab

• The administrator at the hub device can completely control VPN traffic betwexample,

– He or she might permit only HTTP traffic to flow from sites A to B, but afrom B to A.

– He or she can allow traffic originating from A to reach C, but deny traff

– He or she can allow a specific host at A to reach the entire D network,host at D to reach a different host at A.

• The administrator at the hub device can completely control outbound traffic each perimeter site, there must first be a policy that tunnels all outbound trathe hub; for example: set policy top from trust to untrust any any any tuname_str defines the specific VPN tunnel from each perimeter site to the hucan control Internet access, allowing certain kinds of traffic (such as HTTP oon undesirable Web sites, and so on.

• Regional hubs can be used and interconnected via spoke tunnels, allowing reach spoke sites in another.

Example: Back-to-Back VPNsThe following example is similar to “Example: Hub-and-Spoke VPNs” on page 460 exat the hub site in New York performs policy checking on the traffic it routes betweenoffices in Tokyo and Paris. By putting each remote site in a different zone, you contr

The Tokyo LAN address is in the user-defined X1 zone, and the Paris LAN address Both zones are in the Trust-VR routing domain.

Note: To create user-defined zones, you must first obtain and load a zone software

Page 464: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

450

l.2 interface. Although you do both tunnel interfaces. Routes e IP address for a tunnel t is routed to the tunnel

see in the illustration below, makes use of the tunnels are in t the security level predefined to the untrust-vr. Because the tunnel name specified in a

low.

Tokyo LAN10.10.1.0/24

Paris LAN10.20.1.0/24

poke)1.1is (Spoke)0.2.2.2

Untrust-VR Routing Domain

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

You bind the VPN1 tunnel to the tunnel.1 interface and the VPN2 tunnel to the tunnenot assign IP addresses to the X1 and X2 zone interfaces, you do give addresses tofor these interfaces automatically appear in the Trust-VR routing table. By putting thinterface in the same subnet as that of the destination, traffic destined for that subneinterface.

The outgoing interface is ethernet3, which is bound to the Untrust zone. As you can both tunnels terminate in the Untrust zone; however, the endpoints for the traffic that the X1 and X2 zones. The tunnels use AutoKey IKE, with preshared keys. You selecas “Compatible” for both Phase 1 and Phase 2 proposals. You bind the Untrust zonetunnels are route-based (that is, the correct tunnel is determined by routing, not by apolicy), proxy IDs are included in the configuration of each tunnel.

Note: Only the configuration for the NetScreen device at the hub site is provided be

X1 Zone

VPN1

VPN2

New York Corporate Site

(Hub)

Interface: tunnel.1

10.10.1.2/24

Tokyo (S110.1.

Par22

New YorkOutgoing Interface

Untrust Zone eth3, IP 123.1.1.1/24

Default Gateway

IP 123.1.1.2

X2 Zone

Policy LookupTrust Zone

Trust-VR Routing Domain

eth1, 10.1.1.1/24 Interface: tunnel.2

10.20.1.2/24

Page 465: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

451

k OK :

k OK :

:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI

1. Security Zones and Virtual RoutersNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

IP Address/Netmask: 0.0.0.0/0

Manage IP: 0.0.0.0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Null

Network > Zones > Edit (for Untrust): Enter the following, and then click OK

Virtual Router Name: untrust-vr

Block Intra-Zone Traffic: (select)

Network > Zones > New: Enter the following, and then click OK :

Zone Name: X1

Virtual Router Name: trust-vr

Block Intra-Zone Traffic: (select)

Network > Zones > New: Enter the following, and then click OK :

Name: X2

Virtual Router Name: trust-vr

Block Intra-Zone Traffic: (select)

Page 466: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

452

k OK:

K:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. InterfacesNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 123.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): X1 (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.10.1.2/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.2

Zone (VR): X2 (trust-vr)

Fixed IP: (select)

IP Address / Netmask: 10.20.1.2/24

Page 467: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

453

(select)

: 110.1.1.1

ttings, and then click Return to on page:

/24

1.0/24

llowing: for the Local IP and Netmask, and

d another in the Untrust zone address licy referencing the VPN tunnel to the

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

3. VPN for Tokyo OfficeVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: Tokyo

Type: Static IP: (select), Address/Hostname

Preshared Key: netscreen1

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)24

Local IP / Netmask: 10.20.1.0

Remote IP / Netmask: 10.10.

Service: ANY

24. When configuring the VPN tunnel on the NetScreen device protecting the Tokyo and Paris offices, do either of the fo(Route-based VPN) Select the Enable Proxy-ID check box and enter 10.10.1.0/24 (Tokyo) and 10.20.1.0/24 (Paris)10.20.1.0/24 (Tokyo) and 10.10.1.0/24 (Paris) for the Remote IP and Netmask.(Policy-based VPN) Make an entry in the Trust zone address book for 10.10.1.0/24 (Tokyo) and 10.20.1.0/24 (Paris) anbook for 10.20.1.0/24 (Tokyo) and 10.10.1.0/24 (Paris). Use those as the source and destination addresses in the pohub site.

Page 468: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

454

(select)

: 220.2.2.2

ttings, and then click Return to on page:

/24

1.0/24

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPN for Paris OfficeVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: Paris

Type: Static IP: (select), Address/Hostname

Preshared Key: netscreen2

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)

Local IP / Netmask: 10.10.1.0

Remote IP / Netmask: 10.20.

Service: ANY

Page 469: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

455

then click OK:

st-vr

nd then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Next Hop Virtual Router Name: (select), untru

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 123.1.1.2

6. AddressesObjects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Tokyo LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.10.1.0/24

Zone: X1

Objects > Addresses > List > New: Enter the following, and then click OK :

Address Name: Paris LAN

IP Address/Domain Name:

IP/Netmask: (select), 10.20.1.0/24

Zone: X2

Page 470: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

456

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

7. PoliciesPolicy > (From: X1, To: X2) New: Enter the following, and then click OK:

Source Address:

Address Book Entry: (select), Tokyo LAN

Destination Address:

Address Book Entry: (select), Paris LAN

Service: ANY

Action: Permit

Position at Top: (select)

Policy > (From: X2, To: X1) New: Enter the following, and then click OK:

Source Address:

Address Book Entry: (select), Paris LAN

Destination Address:

Address Book Entry: (select), Tokyo LAN

Service: ANY

Action: Permit

Position at Top: (select)

Page 471: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

457

ce ethernet3 preshare

.10.1.0/24 any25

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI

1. Security Zones and Virtual Routersunset interface ethernet3 ipunset interface ethernet3 zoneset zone untrust vrouter untrust-vrset zone untrust blockset zone name X1set zone x1 vrouter trust-vrset zone x1 blockset zone name x2set zone x2 vrouter trust-vrset zone x2 block

2. Interfacesset interface ethernet3 zone untrustset interface ethernet3 ip 123.1.1.1/24set interface tunnel.1 zone x1set interface tunnel.1 ip 10.10.1.2/24set interface tunnel.2 zone x2set interface tunnel.2 ip 10.20.1.2/24

3. VPN for Tokyo Officeset ike gateway Tokyo address 110.1.1.1 outgoing-interfa

netscreen1 sec-level compatibleset vpn VPN1 gateway Tokyo sec-level compatibleset vpn VPN1 bind interface tunnel.1

set vpn VPN1 proxy-id local-ip 10.20.1.0/24 remote-ip 10

Page 472: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Back-to-Back VPNs

458

ce ethernet3 preshare

.20.1.0/24 any

t3 gateway 123.1.1.2

permit26

permit

llowing:.0/24 (Tokyo) and set vpn VPN1

d another in the Untrust zone address cies referencing the VPN tunnel to the

erfaces in the <zone_name> zone are

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPN for Paris Officeset ike gateway Paris address 220.2.2.2 outgoing-interfa

netscreen2 sec-level compatibleset vpn VPN2 gateway Paris sec-level compatibleset vpn VPN2 bind interface tunnel.2set vpn VPN2 proxy-id local-ip 10.10.1.0/24 remote-ip 10

5. Routesset vrouter trust-vr route 0.0.0.0/0 vrouter untrust-vrset vrouter untrust-vr route 0.0.0.0/0 interface etherne

6. Addressesset address x1 “Tokyo LAN” 10.10.1.0/24set address x2 “Paris LAN” 10.20.1.0/24

7. Policies

set policy top from x1 to x2 “Tokyo LAN” “Paris LAN” anyset policy top from x2 to x1 “Paris LAN” “Tokyo LAN” anysave

25. When configuring the VPN tunnel on the NetScreen device protecting the Tokyo and Paris offices, do either of the fo(Route-based VPN) Enter the following commands: set vpn VPN1 proxy-id local-ip 10.20.1.0/24 remote-ip 10.10.1proxy-id local-ip 10.10.1.0/24 remote-ip 10.20.1.0/24 (Paris).(Policy-based VPN) Make an entry in the Trust zone address book for 10.10.1.0/24 (Tokyo) and 10.20.1.0/24 (Paris) anbook for 10.20.1.0/24 (Tokyo) and 10.10.1.0/24 (Paris). Use those as the source and destination addresses in the polihub site.

26. You can ignore the following message, which appears because tunnel interfaces are in NAT mode: Warning: Some intin NAT mode. Traffic might not pass through them!

Page 473: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

459

a pair of routes so that the are contained within a single to the other. You only need to

tunnels.

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

HUB-AND-SPOKE VPNSIf you create two VPN tunnels that terminate at a NetScreen device, you can set up NetScreen device directs traffic exiting one tunnel to the other tunnel. If both tunnelszone, you do not need to create a policy to permit the traffic to pass from one tunneldefine the routes. Such an arrangement is known as hub-and-spoke VPNs.

You can also configure multiple VPNs in one zone and route traffic between any two

Hub-and-Spoke VPN TunnelsUntrust Zone

The NetScreen device routes traffic from one tunnel to the other tunnel.

Remote Sites

Multiple Hub-and-Spoke VPN Tunnels

The NetScreen device routes traffic between tunnels.

Untrust Zone

Page 474: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

460

r via a pair of VPN tunnels—rporate site in New York. The tunnel.

ds to do a route lookup—not a ndpoints are in the same zone

unnumbered. The tunnels use ompatible” for both Phase 1 e interface is ethernet3.

tunnel interfaces.

sed hub-and-spoke VPNs, you ecurity zones.

Tokyo LAN10.2.2.0/24

Paris LAN10.3.3.0/24

untrust-vr Routing Domain

.3.3)

.2.2 )

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Example: Hub-and-Spoke VPNsIn this example, two branch offices in Tokyo and Paris communicate with each otheVPN1 and VPN2. Each tunnel originates at the remote site and terminates at the coNetScreen device at the corporate site routes traffic exiting one tunnel into the other

By disabling intrazone blocking, the NetScreen device at the corporate site only neepolicy lookup—when conducting traffic from tunnel to tunnel because both remote e(the Untrust Zone)27.

You bind the tunnels to the tunnel interfaces—tunnel.1 and tunnel.2—which are bothAutoKey IKE, with the preshared keys. You select the security level predefined as “Cand Phase 2 proposals. You bind the Untrust zone to the untrust-vr. The Untrust zon

27. Optionally, you can leave intrazone blocking enabled and define an intrazone policy permitting traffic between the two

Note: The following configuration is for route-based VPNs. If you configure policy-bamust use the Trust and Untrust zones in the policies; you cannot use user-defined s

Untrust Zone

VPN1

VPN2New York � Corporate Site

(Hub)Interface: tunnel.1Interface: tunnel.2

Default GatewayIP 1.1.1.250

Internet

Paris 3.3(Spoke

Tokyo 2.2(Spoke

Outgoing Interface

eth3IP 1.1.1.1

Page 475: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

461

k OK :

k OK :

:

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (New York)

1. Security Zones and Virtual RoutersNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

IP Address/Netmask: 0.0.0.0/0

Manage IP: 0.0.0.0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Null

Network > Zones > Edit (for Untrust): Enter the following, and then click OK

Virtual Router Name: untrust-vr

Block Intra-Zone Traffic: (clear)

2. InterfacesNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 1.1.1.1/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (untrust-vr)

Unnumbered: (select)

Interface: ethernet3 (untrust-vr)

Page 476: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

462

K:

(select)

e: 2.2.2.2

ttings, and then click Return to on page:

/0

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.2

Zone (VR): Untrust (untrust-vr)

Unnumbered: (select)

Interface: ethernet3 (untrust-vr)

3. VPN for Tokyo OfficeVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: Tokyo

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

Page 477: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

463

(select)

e: 3.3.3.3

ttings, and then click Return to on page:

/0

nd then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPN for Paris OfficeVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: Paris

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

5. RoutesNetwork > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 10.2.2.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

Page 478: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

464

nd then click OK:

nd then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 10.3.3.0/24

Gateway: (select)

Interface: tunnel.2

Gateway IP Address: 0.0.0.0

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 1.1.1.250

Page 479: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

465

k OK :

k OK :

:

k Apply :

k OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

WebUI (Tokyo)

1. Security Zones and Virtual RoutersNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

IP Address/Netmask: 0.0.0.0/0

Manage IP: 0.0.0.0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Null

Network > Zones > Edit (for Untrust): Enter the following, and then click OK

Virtual Router Name: untrust-vr

Block Intra-Zone Traffic: (select)

2. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.2.2.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 2.2.2.2/24

Page 480: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

466

K:

(select)

e: 1.1.1.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (untrust-vr)

Unnumbered: (select)

Interface: ethernet3 (untrust-vr)

3. AddressObjects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Paris

IP Address/Domain Name:

IP/Netmask: (select), 10.3.3.0/24

Zone: Untrust

4. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN1

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: New York

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen1

Security Level: Compatible

Outgoing Interface: ethernet3

Page 481: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

467

ttings, and then click Return to on page:

/0

then click OK:

st-vr

nd then click OK:

nd then click OK:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Next Hop Virtual Router Name: (select); untru

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 2.2.2.250

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 10.3.3.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

Page 482: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

468

OK :

k OK :

k OK :

:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Any

Destination Address:

Address Book Entry: (select), Paris

Service: ANY

Action: Permit

WebUI (Paris)

1. Security Zones and Virtual RoutersNetwork > Interfaces > Edit (for ethernet3): Enter the following, and then clic

IP Address/Netmask: 0.0.0.0/0

Manage IP: 0.0.0.0

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Null

Network > Zones > Edit (for Untrust): Enter the following, and then click OK

Virtual Router Name: untrust-vr

Block Intra-Zone Traffic: (select)

Page 483: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

469

k Apply :

k OK:

K:

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

2. InterfacesNetwork > Interfaces > Edit (for ethernet1): Enter the following, and then clic

Zone Name: Trust

Static IP: (select this option when present)

IP Address/Netmask: 10.3.3.1/24

Select the following, and then click OK:

Interface Mode: NAT

Network > Interfaces > Edit (for ethernet3): Enter the following, and then clic

Zone Name: Untrust

Static IP: (select this option when present)

IP Address/Netmask: 3.3.3.3/24

Network > Interfaces > New Tunnel IF: Enter the following, and then click O

Tunnel Interface Name: tunnel.1

Zone (VR): Untrust (untrust-vr)

Unnumbered: (select)

Interface: ethernet3 (untrust-vr)

3. AddressObjects > Addresses > List > New: Enter the following, and then click OK:

Address Name: Tokyo

IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.0/24

Zone: Untrust

Page 484: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

470

(select)

e: 1.1.1.1

ttings, and then click Return to on page:

/0

then click OK:

st-vr

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

4. VPNVPNs > AutoKey IKE > New: Enter the following, and then click OK :

VPN Name: VPN2

Security Level: Compatible

Remote Gateway: Create a Simple Gateway:

Gateway Name: New York

Type: Static IP: (select), Address/Hostnam

Preshared Key: netscreen2

Security Level: Compatible

Outgoing Interface: ethernet3

> Advanced: Enter the following advanced sereturn to the basic AutoKey IKE configurati

Proxy-ID: (select)

Local IP / Netmask: 0.0.0.0/0

Remote IP / Netmask: 0.0.0.0

Service: ANY

5. RoutesNetwork > Routing > Routing Entries > trust-vr New: Enter the following, and

Network Address / Netmask: 0.0.0.0/0

Next Hop Virtual Router Name: (select); untru

Page 485: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

471

nd then click OK:

nd then click OK:

OK :

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 0.0.0.0/0

Gateway: (select)

Interface: ethernet3

Gateway IP Address: 3.3.3.250

Network > Routing > Routing Entries > untrust-vr New: Enter the following, a

Network Address / Netmask: 10.2.2.0/24

Gateway: (select)

Interface: tunnel.1

Gateway IP Address: 0.0.0.0

6. PoliciesPolicies > (From: Trust, To: Untrust) New: Enter the following, and then click

Source Address:

Address Book Entry: (select), Any

Destination Address:

Address Book Entry: (select), Tokyo

Service: ANY

Action: Permit

Page 486: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

472

ethernet3 preshare

.0/0 any

ethernet3 preshare

.0/0 any

l.1l.2t3 gateway 1.1.1.250

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (New York)

1. Security Zones and Virtual Routersunset interface ethernet3 ipunset interface ethernet3 zoneset zone untrust vrouter untrust-vrunset zone untrust block

2. Interfacesset interface ethernet3 zone untrustset interface ethernet3 ip 1.1.1.1/24set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3set interface tunnel.2 zone untrustset interface tunnel.2 ip unnumbered interface ethernet3

3. VPN for Tokyo Officeset ike gateway Tokyo address 2.2.2.2 outgoing-interface

netscreen1 sec-level compatibleset vpn VPN1 gateway Tokyo sec-level compatibleset vpn VPN1 bind interface tunnel.1set vpn VPN1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

4. VPN for Paris Officeset ike gateway Paris address 3.3.3.3 outgoing-interface

netscreen2 sec-level compatibleset vpn VPN2 gateway Paris sec-level compatibleset vpn VPN2 bind interface tunnel.2set vpn VPN2 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

5. Routesset vrouter untrust-vr route 10.2.2.0/24 interface tunneset vrouter untrust-vr route 10.3.3.0/24 interface tunneset vrouter untrust-vr route 0.0.0.0/0 interface ethernesave

Page 487: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

473

rface ethernet3

.0/0 any

t3 gateway 2.2.2.250l.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

CLI (Tokyo)

1. Security Zones and Virtual Routersunset interface ethernet3 ipunset interface ethernet3 zoneset zone untrust vrouter untrust-vr

2. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.2.2.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 2.2.2.2/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

3. Addressset address untrust Paris 10.3.3.0/24

4. VPNset ike gateway “New York” address 1.1.1.1 outgoing-inte

preshare netscreen1 sec-level compatibleset vpn VPN1 gateway “New York” sec-level compatibleset vpn VPN1 bind interface tunnel.1set vpn VPN1 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

5. Routesset vrouter trust-vr route 0.0.0.0/0 vrouter untrust-vrset vrouter untrust-vr route 0.0.0.0/0 interface etherneset vrouter untrust-vr route 10.3.3.0/24 interface tunne

Page 488: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

474

rface ethernet3

.0/0 an

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

6. Policiesset policy from trust to untrust any Paris any permitset policy from untrust to trust Paris any any permitsave

CLI (Paris)

1. Security Zones and Virtual Routersunset interface ethernet3 ipunset interface ethernet3 zoneset zone untrust vrouter untrust-vr

2. Interfacesset interface ethernet1 zone trustset interface ethernet1 ip 10.3.3.1/24set interface ethernet1 nat

set interface ethernet3 zone untrustset interface ethernet3 ip 3.3.3.3/24

set interface tunnel.1 zone untrustset interface tunnel.1 ip unnumbered interface ethernet3

3. Addressset address untrust Tokyo 10.2.2.0/24

4. VPNset ike gateway “New York” address 1.1.1.1 outgoing-inte

preshare netscreen2 sec-level compatibleset vpn VPN2 gateway “New York” sec-level compatibleset vpn VPN2 bind interface tunnel.1set vpn VPN2 proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0

Page 489: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

475

t3 gateway 3.3.3.250l.1

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

5. Routesset vrouter trust-vr route 0.0.0.0/0 vrouter untrust-vrset vrouter untrust-vr route 0.0.0.0/0 interface etherneset vrouter untrust-vr route 10.2.2.0/24 interface tunne

6. Policiesset policy from trust to untrust any Tokyo any permitset policy from untrust to trust Tokyo any any permit

save

Page 490: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Chapter 7 Advanced VPN Features Hub-and-Spoke VPNs

476

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs
Page 491: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Index

IX-I

lating Security PayloadESPnrithms 8, 66, 70, 74, 79, 8enticate only 70ypt and authenticate 70, 78ypt only 70

el behavior 443

IDficates 262–273hared key 274–282 ID user 261–282

ficates 262hared key 274

ed message authentication codeHMAC

9, 113, 223p IKE ID user 261–282p IKE ID, container 266p IKE ID, wildcard 265tbeats 426 messages 426ID 66–68, 75–76ID recommendations 90ID, Windows 200 312, 325

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

IndexSymbols3DES 8

AAES (Advanced Encryption Standard) 8Aggressive Mode 12AH 3, 7anti-replay checking 68, 76attacks

Replay 14authentication

algorithms 7, 66, 71, 75, 79Authentication Header

See AHAutoKey IKE VPN 9

management 9

CCA certificates 26, 30certificates 10

CA 26, 30loading 34local 30requesting 31revocation 29, 44via e-mail 30

Challenge Handshake Authentication ProtocolSee CHAP

CHAP 297, 300character types, ScreenOS supported xCLI

conventions vicontainer 266conventions

CLI viillustration ixnames xWebUI vii

CRL (Certificate Revocation List) 28, 44loading 28

cryptographic options 62–79anti-replay checking 68, 76authentication algorithms 66, 71, 75, 79authentication types 64, 73certificate bit lengths 65, 73dialup 72–79dialup VPN recommendations 79Diffie-Hellman groups 65, 68, 74, 77encryption algorithms 66, 70, 74, 79ESP 70, 78IKE ID 66–68, 75–76IPSec protocols 69, 78key methods 64PFS 68, 77Phase 1 modes 64, 73site-to-site 63–71site-to-site VPN recommendations 71Transport mode 78Tunnel mode 78

DData Encryption Standard

See DESDES 8Diffie-Hellman exchange 13Diffie-Hellman groups 13, 65, 68, 74, 77digital signature 24DIP pools

extended interfaces 190NAT for VPNs 190

DN (distinguished name) 261DNS

L2TP settings 300

EEncapsu

See encryptio

algoESP 3, 7

authencrencr

FFailover

tunn

Ggroup IKE

certipres

group IKEcertipres

Hhash-bas

See HMAC 7

IIKE 9, 9

grougrougrouhearhelloIKE IKE IKE

Page 492: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Index

IX-II

35–344ling 343

packet 339tor and responder 342c packet 340alive frequency 341

acles for VPNs 338ing for NAT 336–337versalNAT-Tn-RemoteKey IKE VPN 223mic peer 232, 243-T option 335ble 365–370essing scheme 367matic entries 370ual entries 369ping routes to tunnels 366

nline Certificate Status Protocol) 44t 44onder 44

wund VPN 85–86ound VPN 83–84y-based VPN 87–88-based VPN 82–86, 300

d Authentication ProtocolPAPorward SecrecyPFS 68, 7711osals 11osals, predefined 1113osals 13osals, predefined 14

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

local ID, ASN1-DN 264Phase 1 proposals, predefined 11Phase 2 proposals, predefined 14proxy IDs 14redundant gateways 424–442remote ID, ASN1-DN 264shared IKE ID user 283–291

illustrationconventions ix

interfacesextended 190

Internet Key ExchangeSee IKE

IP addressesextended 190

IP SecuritySee IPSec

IPSec 3AH 2, 69, 78digital signature 24ESP 2, 69, 78SAs 2, 10, 11, 13SPI 2transport mode 4, 297, 303, 310tunnel 2tunnel mode 5tunnel negotiation 11

Kkeepalive

frequency, NAT-T 341L2TP 307

LL2TP 293–332

access concentrator: See LACbidirectional 297compulsory configuration 294decapsulation 299default parameters 300encapsulation 298hello signal 307Keep Alive 307L2TP-only on Windows 2000 297

network server: See LNSoperational mode 297RADIUS server 300ScreenOS support 297SecurID server 300tunnel 303voluntary configuration 294Windows 2000 315Windows 2000 tunnel authentication 307

L2TP-over-IPSec 4, 303, 310bidirectional 297tunnel 303

LAC 294NetScreen-Remote 5.0 294Windows 2000 294

Layer 2 Tunneling ProtocolSee L2TP

LNS 294local certificate 30

MMain Mode 12Manual Key 153, 164

management 9MD5 7Message Digest version 5

See MD5MIB files, importing 364MIP

VPNs 190modulus 13

Nnames

conventions xNAT

IPSec and NAT 335NAT servers 335

NAT-dstVPNs 190

NAT-srcVPNs 193

NAT-T 3enabIKE initiaIPSekeepobstprob

NAT-TraSee

NetScreeAutodynaNAT

NHTB taaddrautomanmap

OOCSP (O

clienresp

Ppacket flo

inbooutbpolicroute

PAP 297Passwor

See Perfect F

See PFS 14,Phase 1

propprop

Phase 2propprop

PKI 26

Page 493: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Index

IX-III

ressive mode 12Key IKE 9iguration tips 89–90tographic options 62–79-Hellman exchange 13-Hellman groups 13N aliases 174N for gateway 173–189 mode 12190

iple tunnels per tunnel interface 365–420 for overlapping addresses 190–207-dst 190-src 193et flow 82–88e 1 11e 2 13

y IDs, matching 89ndant gateways 424–442ndant groups, recovery procedure 427y protection 14- vs policy-based 8010

el always up 346 groups 424 monitoring and rekey 346

entions vii265

settings 300

monitoring 348

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs

Point-to-Point ProtocolSee PPP

policiesbidirectional VPNs 165

policy-based VPNs 80PPP 295preshared key 9, 223proposals

Phase 1 11, 89Phase 2 13, 89

protocolsCHAP 297PAP 297PPP 295

proxy IDs 14matching 81, 89VPNs and NAT 190–191

Public key infrastructureSee PKI

Public/private key pair 27

RRADIUS

L2TP 300redundant gateways 424–442

recovery procedure 427TCP SYN flag checking 430

rekey option, VPN monitoring 346replay protection 14route-based VPNs 80–81

SSAs 10, 11, 13

check in packet flow 84SCEP (Simple Certificate Enrollment Protocol) 38Secure Hash Algorithm-1

See SHA-1SecurID

L2TP 300

security associationSee SAs

SHA-1 7SNMP

MIB files, importing 364VPN monitoring 364

TTCP

SYN flag checking 430transport mode 4, 297, 303, 310Triple DES

See 3DEStunnel failover 443tunnel mode 5

UUDP

checksum 341NAT-T encapsulation 335

usersgroup IKE ID 261–282shared IKE ID 283–291

VVerisign 44VPN monitoring 345–361

destination address 347–350destination address, XAuth 348ICMP echo requests 364outgoing interface 347–350policies 349rekey option 346, 370routing design 362SNMP 364status changes 345, 349

VPN tunnel recovery 443

VPNsAggAutoconfcrypDiffieDiffieFQDFQDMainMIPmultNATNATNATpackPhasPhasproxreduredureplarouteSAstunnVPNVPN

WWebUI

convwildcardWINS

L2TP

XXAuth

VPN

Page 494: ScreenOS Reference Guide - Psychology &  · PDF fileScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 ... Chapter 1 IPSec ... • Site-to-site VPNs • Dialup VPNs

Index

IX-IV

Juniper Networks NetScreen Concepts & Examples � Volume 5: VPNs