Juniper SRX VPN configuration
Route Based VPN configuration :
- Configure Phase 1 Configuration (edit security ike)
- Proposal – optional
- Policy
- mode: main or aggressive
- Reference a proposal: preconfigured or default
- Pre-shared key
- Gateway
- Reference a policy
- Peer Address
- Exit interface
- Phase 2 Configuration (edit security ipsec)
- Proposal – optional
- Policy
- Reference a proposal: preconfigured or default
- PFS – optional
- VPN
- bind interface st0.x
- ike
- Reference getaway
- Reference ipsec-policy
- Define Proxy-identity
- establish-tunnel immediately or when traffic
- Security policy
- permit traffic from remote zone to st0 zone and back
- permit ike and ipsec traffic
- Interface configuration
- Interface st0.x – ip address
- Configure route to st0.x
Policy Based VPN configuration :
Verify and debug:
- Phase 1 (edit security ike)
- Proposal – optional
- Policy
- mode: main
- Reference a proposal: preconfigured or default
- Preshared key
- Gateway
- Reference a policy
- Peer Address
- Exit interface
- Phase 2 (edit security ipsec)
- Proposal – optional
- Policy
- Reference a proposal: preconfigured or default
- PFS – optional
- VPN
- ike
- Reference getaway
- Reference ipsec-policy
- Optionally proxy identities can be defined
- establish-tunnel immediately or when traffic
- ike
- Security policy
- Configure Address Book entries for source and destination addresses under “zones”
- Configure policy from remote to local LAN and vice versa
- In addition to the “permit” action, specify the IPSec Profile to be used
- Include pair-policy statement to make the VPN bi-directional
- Configure NAT rules if needed – source and destination
- Configure tcp maximum segment size (tcp-mss)
Verify and debug:
>show security ike security-associations 1.1.1.1 (detail)
>show security ike active-peer
>show security ipsec security-associations
>show security ipsec inactive-tunnels
>show security ipsec statistics
>show interfaces st0.0 extensive
>show security flow session interface st0.0
>request security ike debug-enable local 173.167.224.13 remote 99.182.0.14 level 15
>show log kmd
Use traceoptions
************************
Cisco ASA VPN Configuration:
- Configure ISAKMP Policy (optional)
- Configure Transform set with IPSec details
- Configure Crypto ACL (specify traffic to be encrypted)
- Configure pre-shared key for the peer
- Configure Crypto Map
- crypto ACL
- peer address
- reference transform set
- interface (name)
- Configure static route pointing to the tunnel (optional)
- Enable isakmp on interface - crypto isakmp enable interface_name
- Permit VPN traffice to ASA
- from peer address to vpn address - eps and udp isakmp