Junos Os Multipoint VPN Configuration With Next-Hop Tunnel Binding
Junos Os Multipoint VPN Configuration With Next-Hop Tunnel Binding
Junos Os Multipoint VPN Configuration With Next-Hop Tunnel Binding
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Design Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Route-to-Tunnel Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Network Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Configuration Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Configuration Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Troubleshooting Basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Table of figures
Figure 1: NHTB routes and table entries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Introduction
Juniper Networks Junos operating system runs on Juniper Networks J Series Services Routers and Juniper Networks
SRX Series Services Gateways. Junos OS provides not only a powerful operating system, but also a rich IP services tool
kit. It has enhanced security and VPN capabilities via Junipers firewall/IPsec VPN platforms, which includes the Juniper
Networks SSG Series Secure Services Gateways. This application note discusses configuration of a multipoint topology,
which is commonly used for hub-and-spoke environments, using these systems.
Scope
Route-based VPNs from a central hub device to multiple spoke devices are used in this application. (Multipoint with
policy-based VPNs is not supported in Junos OS.)
This document is intended for network design and security engineers, as well as implementation partners supporting
customers requiring secure connectivity over public networks.
Design Considerations
This document applies to the following devices:
There are many ways to implement a hub-and-spoke VPN topology using the concepts of route-based VPNs. One
way is to configure a separate secure tunnel (st0) logical unit for every spoke site. However, if a device has too many
peers, the number of required interfaces becomes a concern from a scaling and management perspective. For example,
for the SSG Series, a limitation applies to the maximum number of tunnel interfaces that can be configured for the
platform. With Junos OS, a limitation applies to the maximum number of logical interface units. To allow for easier
management and scalability, Junos OS supports multipoint secure tunnel interfaces with the next-hop tunnel binding
(NHTB) feature. This allows a device to bind multiple IPsec security associations (SAs) to a single secure tunnel
interface.
By default, the secure tunnel interface operates as a point-to-point type link. For our hub-and-spoke example, the
Junos OS-based hub device configures an st0 interface as type multipoint, which is configured in the st0 unit hierarchy.
Multipoint configuration is only required on the hub sitethe spokes continue to use the default point-to-point mode.
As already mentioned, multiple IPsec VPN tunnels can be bound to a single st0 interface unit. To link a specific
destination to a specific IPsec tunnel bound to the same st0 interface, the Junos OS-based device uses two tables:
the inet.0 route table and the NHTB table. The Junos OS-based device maps the next-hop IP address specified in the
route table entry to a particular VPN tunnel specified in the NHTB table. With this technique, a single st0 interface can
support many VPN tunnels.
Using this method, the maximum number of IPsec tunnels is not limited by the number of st0 interfaces that can be
created. Limitations are limited by either route table capacity or the maximum number of dedicated IPsec tunnels
allowedwhichever is lower. To see the maximum route and tunnel capacities by platform, refer to the relevant product
data sheet.
Route-to-Tunnel Mapping
To sort traffic among multiple IPsec VPN tunnels bound to the same st0 interface, the security device maps the next-
hop gateway IP address specified in the route to a particular IPsec tunnel name. The mapping of entries in the route
table to entries in the NHTB table is shown below. In Figure 1, the local device routes traffic sent from 10.10.10.10 to
10.30.10.10 through the st0.0 interface and through VPN2.
Local security device with multiple IPsec VPNs Remote VPN peers with fixed st0.0 interface IP
bound to a single secure tunnel (st0) interface addresses all within the same 10.1.1.0/24 subnet
in subnet 10.1.1.0/24 Trunsted LAN interface as the local device st0 interface Remote trusted
is in subnet 10.10.10.0/24. St0.0 interface is subnets as below. St0.0 in point-to-point mode.
configured in multipoint mode. st0.0
10.1.1.2 J2350
10.20.10.0/24
Trust zone LAN
VPN1
st0.0 st0.0
J2350 10.1.1.1 10.1.1.3 J2350
VPN2
10.10.10.0/24 10.30.10.0/24
Trust zone LAN Trust zone LAN
VPN3
10.10.10.10 st0.0 10.30.10.10
10.1.1.4 J2350
10.40.10.0/24
Trust zone LAN
In the above entries, the IP address for the next-hop in the route table (which is also the same next-hop
IP in the NHTB table) is the st0 interface IP of the remote peer site. This next-hop links the route-and
consequently the st0 interface specified in the route-to a particular IPsec VPN tunnel.
For the purposes of this application note, we will focus on configuration and verification of a multipoint environment
in a hub-and-spoke topology with two spokes. One spoke (Westford) is a Junos OS-based device running software
version 8.5, whereas the other spoke (Sunnyvale) is an SSG Series device running Juniper Networks ScreenOS
Software 5.4.0 to outline interoperability requirements (refer to the Network Diagram in Figure 2). Additional spokes
are easily added by duplicating the configurations from any existing spokes, changing IP addresses as needed, and
adding any additional static routes for new spoke local LANs.
Troubleshooting and configuration details of route-based VPNs, along with other Junos OS-specific application notes,
can be found on Juniper Networks Knowledge Base at http://kb.juniper.net. In particular, article KB10182 lists several
application notes related to VPN configuration and troubleshooting. For more details on the concepts of NHTB, route-
based VPNs, and interface types, please refer to the complete documentation available at www.juniper.net/techpubs.
Network Diagram
Refer to Figure 2 below for the network topology used for this configuration example.
CORPORATE OFFICE
J4350
SUNNYVALE
SSG5
e0/0
ge0/0/3.0 2.2.2.2/30
1.1.1.2/30 zone: untrust
zone: untrust
e0/0
3.3.3.2/30 192.168.168.10/24
10.10.10.10/24 zone: untrust
J2320
WESTFORD ge-0/0/3.0
192.168.178.1/24
zone: trust
Clear traffic
VPN traffic
192.168.178.10/24
Configuration Steps
This example assumes the following:
Corporate Office internal LAN interface is ge-0/0/0.0 in zone trust and will have a private IP subnet. Corporate
Office Internet interface is ge-0/0/3.0 in zone untrust and will have a public IP.
Westford Office internal LAN interface is ge-0/0/3.0 in zone trust and will have a private IP subnet. Westford Office
Internet interface is ge-0/0/0.0 in zone untrust and will have a public IP.
The secure tunnel interface st0.0 for Corporate and Westford is in vpn zone to allow for configuring unique policies
specifically for tunnel (encrypted) traffic while maintaining unique policies for clear (unencrypted) traffic.
All st0 interfaces for all peers will have an IP address configured within the same logical subnet. Having all peer
tunnel interface IPs within the same logical subnet is recommended but not absolutely required. However, if OSPF is
configured with a P2MP link type, this is mandatory.
Allow all traffic from all remote offices (spokes) to your corporate LAN (hub) and vice versa. Allow all traffic from
spoke to spoke. However for one spoke to reach the other, first route traffic through the hub.
Although a static NHTB entry is not required between Westford and Corporate (they are both Junos OS-based
devices), a static NHTB entry is required to Sunnyvale since the SSG Series is not a Junos OS-based device.
The Juniper Networks SSG5 Secure Services Gateway has already been preconfigured with the correct information
from this example.
2. Configure the default route to Internet next hop and also static routes for each remote office LAN. Optionally, a
dynamic routing protocol such as OSPF can be used instead, but those details are not included in this application
note.
3. Configure security zones and bind the interfaces to the appropriate zones. Also be sure to enable necessary host-
inbound services on the interfaces or the zone. For this example, Internet Key Exchange (IKE) service must be
enabled on either the ge-0/0/3 interface or the zone untrust.
5. Configure phase 1 (IKE) gateway settings for both remote offices. For this example, we are using a typical proposal
set, however, a different proposal can be created if necessary.
6. Configure phase 2 (IPsec) VPN settings for both remote offices. Optionally, VPN monitor settings can be configured
if desired. For this example, we are using standard proposal set and Perfect Forward Secrecy (PFS) group 2,
however, a different proposal can be created if necessary.
8. Configure st0.0 for multipoint. Configure the NHTB entries for any non-Junos OS spoke sites.
Note: If establishing a VPN between two devices running Junos OS, it is not necessary to configure NHTB since
the hub device is able to obtain the NHTB entry automatically during phase 2 negotiations. However, if the VPN is
configured to establish tunnel on-traffic, the hub site can not initiate the VPN, since without an NHTB entry, the
route for that remote peer will not be in an active state. Thus, either the tunnel will always need to be initiated from
the spoke, or the hub should have establish-tunnel immediately configured.
9. Configure security policies to permit remote office traffic into the Corporate Office LAN and vice versa.
10. Configure outgoing zone trust to zone untrust permit policy with source Network Address Translation (NAT) for
non-encrypted Internet traffic.
11. Configure intra-zone policy in zone vpn to allow spokes to communicate with each other. Intra-zone traffic is
defined as traffic that ingresses and egresses out of the same zone. By default, intra-zone traffic is denied.
12. Configure tcp-mss for IPsec traffic to eliminate the possibility of fragmented TCP traffic. This will lessen the
resource utilization on the device and improve performance.
2. Configure the default route to Internet next hop and also a static route for the Corporate Office LAN.
3. Configure security zones and bind the interfaces to the appropriate zones. Also be sure to enable necessary host-
inbound services on the interfaces or the zone. For this example, IKE service must be enabled on either the ge-0/0/0
interface or to zone untrust.
5. Configure phase 1 (IKE) gateway settings. As noted before, we are using standard proposal set.
6. Configure phase 2 (IPsec) VPN settings. As noted above, a standard proposal set and PFS group 2 is used.
8. Configure security policies to permit Westford Office traffic into the Corporate Office LAN and vice versa.
9. Configure outgoing zone trust to zone untrust permit policy with source NAT for unencrypted Internet traffic.
10. Configure tcp-mss for IPsec traffic to eliminate the possibility of fragmented TCP traffic.
Configuration Example
To begin, enter configuration mode with either the configure or edit command.
Configure IP addresses for private LAN, public Internet, and secure tunnel (st0) interfaces
Note: If the st0 interface is terminated in the same zone as the trusted LAN, and if a policy exists to allow intra-zone
traffic on that zone, no additional security policies are required.
Configure IKE policy for main mode, predefined standard proposal-set, and pre-shared key
Configure spoke IKE gateways (phase 1) with peer IP address, IKE policy, and outgoing interface
Configure IPsec VPNs with IKE gateway and IPsec policy, bind to same st0 interface
Configure st0 interface as multipoint, add static NHTB entry for Sunnyvale Office
Configure security policies for tunnel traffic in both directions for all spokes
Configure IP addresses for private LAN, public Internet, and secure tunnel (st0) interfaces
Configure IKE policy for main mode, predefined standard proposal-set, and pre-shared key
Configure IKE gateway (phase 1) with peer IP address, IKE policy, and outgoing interface
Configure IPsec VPN with IKE gateway and IPsec policy, bind to st0 interface
The first step to confirm VPN status is to check the status of any IKE phase 1 security associations. The command-line
interface (CLI) command run on the Corporate Office (Hub) device is shown below:
Note also index numbers for each spoke peer. This value is unique for each IKE security association and allows you to
receive more details from that particular SA. Example details for Westford SA index 6 are shown below.
Once IKE phase 1 is confirmed, run the following command to view IPsec (phase 2) security associations.
Note also the ID number for each SA. This is the index value and is unique for each IPsec security association. View more
details for a particular SA by specifying the index value. For example, details for Westford SA index 16385 are as follows:
Once phase 2 is complete for all peers, ensure that routing works properly and confirm that the NHTB table is
established correctly. To show the NHTB table, run the following command.
There will not be an NHTB table on any of the spoke sites in this example. This is because from a spoke perspective,
the st0 interface is still a point-to-point link with only one IPsec VPN binding. Thus, the same command shown above
will not show any output on Westford Site.
In order for the NHTB to be used, the static route needs to also reference the spoke peer st0 IP address. Confirm
the route to the remote peer using the following operational mode command: show route <dest-ip-prefix>. See the
example below.
The command shown below is used to check ESP and authentication header (AH) counters, and for any errors with a
particular IPsec security association.
Once you have confirmed the status of IKE phase 1, phase 2, routes, and NHTB entries, the next step is to test traffic
flow across the VPN. One way to test traffic flow is through pings. We can ping from local host PC to remote host
PC. We can also initiate pings from the Junos OS-based device. An example of ping testing from the Junos OS-based
device to the remote PC host on Sunnyvale site is shown below.
Likewise, we can initiate a ping from the spoke site host PC to a host on the Corporate Office LAN. Also, we can initiate a
ping from the SSG5 as shown below. Test pings from spoke to hub and also spoke to spoke, as shown in the example below.
Troubleshooting Basics
Basic troubleshooting begins by first isolating the issue and then focusing the debugging efforts on the area where the
problem is occurring. One common approach is to start with the lowest layer of the Open Systems Interconnection
(OSI) model and work up the OSI stack to confirm at which layer the failure occurs.
Following this methodology, the first step to troubleshooting is to confirm the physical connectivity of the Internet link
at the physical and data link levels. Next, using ping, confirm that the Junos OS-based device has connectivity to the
Internet next hop, followed by confirming connectivity to the remote IKE peer. Confirm that IKE phase 1 can complete by
running the verification commands as shown above. Once phase 1 is confirmed, confirm phase 2. Finally, confirm that
traffic is flowing across the VPN. If the VPN is not in UP state, there is very little reason to test any transit traffic across
the VPN. Likewise if phase 1 has not been successful, then looking at phase 2 issues will not give us additional useful
troubleshooting information.
To troubleshoot issues further at the different levels, configure traceoptions. Traceoptions are enabled in configuration
mode and are a part of a Junos OS configuration. This means that a configuration commit is necessary before a trace
option will take affect. Likewise, removing traceoptions requires deleting or deactivating the configuration followed
by a commit. By enabling a traceoptions flag, the data from the trace option is written to a log file which may be
predetermined or manually configured and stored in persistent memory. This means that any trace logs are retained
even after a system reboot. Keep in mind the available storage on flash before implementing traceoptions. You can
check your available storage as shown on the next page.
As noted earlier, enabling traceoptions begins the logging of the output to the filenames specified or to the default log
file for the trace option. Go to the appropriate log to view the trace output. The commands to view the appropriate logs
are shown as follows:
root@CORPORATE> configure
Entering configuration mode
[edit]
root@CORPORATE# edit security ike traceoptions
[edit]
root@CORPORATE# edit security ike traceoptions
[edit security ike traceoptions]
root@CORPORATE# set file size 1m
root@CORPORATE# set flag policy-manager
root@CORPORATE# set flag ike
root@CORPORATE# set flag routing-socket
root@CORPORATE# commit
Below are some excerpts of successful phase 1 and phase 2 completions and some failure instances from show log
kmd.
Oct 8 10:31:10 Phase-1 [responder] failed with error(No proposal chosen) for
local=unknown(any:0,[0..0]=) remote=ipv4(any:0,[0..3]=2.2.2.2)
Oct 8 10:39:40 Unable to find phase-1 policy as remote peer:2.2.2.2 is not recognized.
Oct 8 10:36:20 Phase-1 [responder] failed with error(Invalid payload type) for
local=unknown(any:0,[0..0]=) remote=ipv4(any:0,[0..3]=2.2.2.2)
The remote peer is 2.2.2.2. Invalid payload type usually means that there has been a problem with the decryption of the
IKE packet due to a pre-shared key mismatch. To resolve this issue, confirm that pre-shared keys match on both peers.
to match the peer proxy ids which means that the proxy ID did not match what was expected.
We can see that we received a phase 2 proxy ID of (remote=192.168.168.0/24, local=10.10.20.0/24, service=any). This
does not match the configurations on the local peer, so the proxy ID match has failed. This results in the error No
proposal chosen. To resolve this issue, configure either peer proxy ID so that it matches the other peer. Note that for a
route-based VPN, the proxy ID is all zeroes (local=0.0.0.0/0, remote=0.0.0.0/0, service=any) by default. If the remote
peer is specifying a proxy ID other than all zeroes, you must manually configure the proxy ID within the IPsec profile of
the peer.
The details of flow traceoptions output is beyond the scope of this application note. However, such flow trace output
information is available in the application note titled: Junos OS Enhanced Services Route-Based VPN Configuration
and Troubleshooting.
Note: Enabling flow traceoptions can cause an increase in system CPU and memory utilization. Therefore, enabling
flow traceoptions is not recommended during peak traffic load times or if CPU utilization is very high. Enabling packet
filters is also highly recommended to lower resource utilizations and to facilitate pinpointing the packets of interest.
Finally be sure to delete or deactivate all flow traceoptions and remove any unnecessary log files from flash after
completing troubleshooting.
[edit]
root@CORPORATE# edit security flow traceoptions
Junos OS has the ability to configure packet filters to limit the scope of the traffic to be captured by the flow
traceoptions. You can filter the output based on source/destination IP, source/destination port, interface, and IP
protocol. Up to 64 filters can be configured. Furthermore, a packet filter will also match the reverse direction to capture
the reply traffic, assuming the source of the original packet matches the filter. See the following example of flow
packet filter options.
[edit]
root@CORPORATE# edit security flow traceoptions
packet-filter remote-to-local {
source-prefix 192.168.168.0/24;
destination-prefix 10.10.10.0/24;
}
The filter shown above captures the decapsulated or unencrypted traffic from remote PC to local PC. Since there are
multiple terms, this acts as a Boolean logical AND, meaning that the source IP and destination IP must both match the
filter. If the source IP matches but the destination IP does not, the packet will not be captured. Since packet filters are
bidirectional, it is not necessary to configure a filter for the reply traffic.
packet-filter local-to-remote {
source-prefix 10.10.10.0/24;
destination-prefix 192.168.178.0/24;
}
No filter is required for capturing the reply traffic. However, a filter will only capture packets which were originally
sourced from the specified side. The local-to-remote filter shown above may still be required to capture traffic which
sources from local to remote side.
packet-filter remote-esp {
protocol 50;
source-prefix 3.3.3.2/32;
}
The filter shown above is optional and depends on whether or not the previous filter is able to capture any packets.
This filter will capture all ESP (IP protocol 50) or encrypted packets from remote peer 2.2.2.2. Note, however, that this
last filter will capture all encrypted traffic from 2.2.2.2, including packets that perhaps we are not interested in seeing. If
the unencrypted traffic is captured, this last filter may not be necessary.
Using the filters shown above, we can troubleshoot any traffic flow issues to and from the Corporate Office and
Westford site. Additional filters can be configured for troubleshooting from Westford to Sunnyvale and vice versa.
In addition, a single host can be specified with the /32 mask to help narrow the scope and avoid having too much
data write to the trace log. Finally, as always, if any assistance is needed in interpreting the data from any of the
traceoptions logs, you can contact your regional JTAC (Juniper Technical Assistance Center). To access the JTAC
website, go to www.juniper.net/customers/support/.
Summary
Juniper Networks Junos operating system provides not only a powerful operating system, but also a rich IP services
tool kit. It has enhanced security and VPN capabilities via Junipers firewall/IPsec VPN platforms that include Juniper
Networks SSG Series Secure Services Gateways.
system {
host-name CORPORATE;
root-authentication {
encrypted-password $1$0wc5IQiB$MTQlktoQ9/nRF10Gntin./; ## SECRET-DATA
}
services {
ssh;
web-management {
http {
interface ge-0/0/0.0;
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any any;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
address 10.10.10.1/24;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 1.1.1.2/30;
}
}
}
st0 {
unit 0 {
multipoint;
family inet {
next-hop-tunnel 10.11.11.11 ipsec-vpn sunnyvale-vpn;
address 10.11.11.10/24;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 1.1.1.1;
route 192.168.168.0/24 next-hop 10.11.11.11;
route 192.168.178.0/24 next-hop 10.11.11.12;
}
}
security {
ike {
traceoptions {
flag policy-manager;
flag ike;
flag routing-socket;
flag general;
}
policy ike-policy1 {
mode main;
proposal-set standard;
pre-shared-key ascii-text $9$LrN7w2mPQF/t24jqmfn6rev; ## SECRET-DATA
}
gateway sunnyvale-gate {
ike-policy ike-policy1;
address 2.2.2.2;
external-interface ge-0/0/3.0;
}
gateway westford-gate {
ike-policy ike-policy1;
address 3.3.3.2;
external-interface ge-0/0/3.0;
}
}
ipsec {
policy vpn-policy1 {
perfect-forward-secrecy {
keys group2;
}
proposal-set standard;
}
vpn sunnyvale-vpn {
bind-interface st0.0;
ike {
gateway sunnyvale-gate;
ipsec-policy vpn-policy1;
}
}
vpn westford-vpn {
bind-interface st0.0;
ike {
gateway westford-gate;
ipsec-policy vpn-policy1;
}
}
}
zones {
security-zone trust {
address-book {
address local-net 10.10.10.0/24;
}
host-inbound-traffic {
system-services {
all;
}
}
interfaces {
ge-0/0/0.0;
}
}
security-zone untrust {
host-inbound-traffic {
system-services {
ike;
}
}
interfaces {
ge-0/0/3.0;
}
}
security-zone vpn {
address-book {
address sunnyvale-net 192.168.168.0/24;
address westford-net 192.168.178.0/24;
}
interfaces {
st0.0;
}
}
}
policies {
from-zone trust to-zone untrust {
policy any-permit {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
source-nat {
interface;
}
}
}
}
}
from-zone trust to-zone vpn {
policy local-to-spokes {
match {
source-address local-net;
destination-address [ sunnyvale-net westford-net ];
application any;
}
then {
permit;
}
}
}
from-zone vpn to-zone trust {
policy spokes-to-local {
match {
source-address [ sunnyvale-net westford-net ];
destination-address local-net;
application any;
}
then {
permit;
}
}
}
from-zone vpn to-zone vpn {
policy spoke-to-spoke {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
flow {
tcp-mss {
ipsec-vpn {
mss 1350;
}
}
}
}
system {
host-name Westford;
root-authentication {
encrypted-password $1$Qk3dVh9X$d3KOf3dhR6uQKhi8FWU.P0; ## SECRET-DATA
}
services {
web-management {
http {
interface ge-0/0/0.0;
}
}
}
syslog {
user * {
any emergency;
}
file messages {
any any;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
}
interfaces {
ge-0/0/0 {
unit 0 {
family inet {
address 3.3.3.2/30;
}
}
}
ge-0/0/3 {
unit 0 {
family inet {
address 192.168.178.1/24;
}
}
}
st0 {
unit 0 {
family inet {
address 10.11.11.12/24;
}
}
}
}
routing-options {
static {
route 0.0.0.0/0 next-hop 1.1.1.1;
route 10.10.10.0/24 next-hop 10.11.11.10;
route 192.168.168.0/24 next-hop 10.11.11.10;
}
}
security {
ike {
traceoptions {
flag policy-manager;
flag ike;
flag routing-socket;
flag general;
}
policy ike-policy1 {
mode main;
proposal-set standard;
pre-shared-key ascii-text $9$VNsaGF39A0IGDPQFnpu8X7; ## SECRET-DATA
}
gateway corp-gate {
ike-policy ike-policy1;
address 1.1.1.2;
external-interface ge-0/0/0.0;
}
}
ipsec {
policy vpn-policy1 {
perfect-forward-secrecy {
keys group2;
}
proposal-set standard;
}
vpn corp-vpn {
bind-interface st0.0;
ike {
gateway corp-gate;
ipsec-policy vpn-policy1;
}
}
}
zones {
security-zone trust {
address-book {
address local-net 192.168.178.0/24;
}
host-inbound-traffic {
system-services {
all;
}
}
interfaces {
ge-0/0/3.0 {
}
}
}
security-zone untrust {
host-inbound-traffic {
system-services {
ike;
}
}
interfaces {
ge-0/0/0.0 {
}
}
}
security-zone vpn {
address-book {
address corp-net 10.10.10.0/24;
address sunnyvale-net 192.168.168.0/24;
}
interfaces {
st0.0;
}
}
}
policies {
from-zone trust to-zone untrust {
policy any-permit {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
source-nat {
interface;
}
}
}
}
}
from-zone vpn to-zone trust {
policy from-corp {
match {
source-address [ corp-net sunnyvale-net ];
destination-address local-net;
application any;
}
then {
permit;
}
}
}
from-zone trust to-zone vpn {
policy to-corp {
match {
source-address local-net;
destination-address [ corp-net sunnyvale-net ];
application any;
}
then {
permit;
}
}
}
}
flow {
tcp-mss {
ipsec-vpn {
mss 1350;
}
}
}
}
Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions,
Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland please contact your Juniper Networks
1194 North Mathilda Avenue 26/F, Cityplaza One Airside Business Park representative at 1-866-298-6428 or
Sunnyvale, CA 94089 USA 1111 Kings Road Swords, County Dublin, Ireland
authorized reseller.
Phone: 888.JUNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600
or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737
Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601
www.juniper.net
Copyright 2009 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,
NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered marks, or registered service marks are the property of
their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.