Hi Friends,
I am trying to setup a VPN tunnel between a customer and application service provider. I completed this job using Cisco IOS and successfully made it. But,
I need this to be done using SRX110: JUNOS Software Release [12.3X48-D40.5]
Can you guys refer my config and let me share your experience. I try policy based routing. Am I correct?, what else I need to change in config level in junos?
Provided by the remote site IT
IKE Phase 1 Proposal
IKE Version IKE V1
Encryption Algorithm Aes-256
Hash Algorithm SHA
Lifetime 86400 (seconds)
DH Group DH Group 2
IKE Phase 2 (IPSEC) Proposal
Mode IKE V1 Tunnel
ESP Encryption aes-256 ,, aes-256-esp
ESP Hash Algorithm sha
AH Hash Algorithm ah
Perfect Forward Secrecy Disabled
Lifetime 28800 (seconds)
working configuration from Cisco IOS:
crypto isakmp policy 10
encr aes 256
authentication pre-share
group 2
crypto isakmp key PRESHARED-KEY address 202.114.x.y
!
!
crypto ipsec transform-set TransformSet1 esp-aes 256 esp-sha-hmac
!
crypto map CryptoMAP1 10 ipsec-isakmp
set peer 202.114.x.y
set transform-set TransformSet1
match address 133
!
interface Loopback1
ip address 172.29.140.36 255.255.255.255
!
interface Vlan1
ip address 192.168.20.1 255.255.255.0
ip nat inside
ip virtual-reassembly
ip tcp adjust-mss 1400
!
interface Dialer1
ip address negotiated
ip mtu 1452
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
no cdp enable
ppp authentication pap callin
ppp pap sent-username username@isp-xyz.com password 7 0R1759034106RW1E1E
crypto map CryptoMAP1
crypto ipsec df-bit clear
!
ip route 0.0.0.0 0.0.0.0 Dialer1
!
ip nat inside source list 111 interface Dialer1 overload
ip nat inside source list 122 interface Loopback1 overload
!
!
access-list 111 remark *** Internet Traffic ***
access-list 111 deny ip 192.168.20.0 0.0.0.255 10.125.0.0 0.0.255.255
access-list 111 permit ip 192.168.20.0 0.0.0.255 any
access-list 122 remark *** VPN NAT in Loopback1 Interface ***
access-list 122 permit ip 192.168.20.0 0.0.0.255 10.125.0.0 0.0.255.255
access-list 122 permit ip host 172.29.140.36 10.125.0.0 0.0.255.255
access-list 133 remark *** IPSec VPN Traffic ***
access-list 133 permit ip host 172.29.140.36 10.125.0.0 0.0.255.255
!
!
I am trying in JunOS..
r
root# show | display set
set version 12.3X48-D40.5
..
set system ntp server 27.124.125.252
set security ike proposal IKE-Proposal authentication-method pre-shared-keys
set security ike proposal IKE-Proposal dh-group group2
set security ike proposal IKE-Proposal authentication-algorithm sha1
set security ike proposal IKE-Proposal encryption-algorithm aes-256-cbc
set security ike proposal IKE-Proposal lifetime-seconds 86400
set security ike policy IKE-Policy mode main
set security ike policy IKE-Policy proposals IKE-Proposal
set security ike policy IKE-Policy pre-shared-key ascii-text "PRE-SHARED-KEY"
set security ike gateway IKE-Gateway ike-policy IKE-Policy
set security ike gateway IKE-Gateway address 202.114.x.y
set security ike gateway IKE-Gateway external-interface pp0.0
set security ipsec proposal IPSec-Proposal protocol esp
set security ipsec proposal IPSec-Proposal authentication-algorithm hmac-sha-256-128
set security ipsec proposal IPSec-Proposal encryption-algorithm 3des-cbc
set security ipsec proposal IPSec-Proposal lifetime-seconds 28800
set security ipsec policy IPSec-Policy perfect-forward-secrecy keys group2
set security ipsec policy IPSec-Policy proposals IPSec-Proposal
set security ipsec vpn IPSec-VPN ike gateway IKE-Gateway
set security ipsec vpn IPSec-VPN ike ipsec-policy IPSec-Policy
set security ipsec vpn IPSec-VPN establish-tunnels immediately
set security flow tcp-mss all-tcp mss 1442
set security flow tcp-mss ipsec-vpn mss 1350
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security nat source rule-set LAN-to-VPN from zone trust
set security nat source rule-set LAN-to-VPN to zone ipsec-vpn
set security nat source rule-set LAN-to-VPN rule VPN-NAT-OFF match source-address 192.168.20.0/24
set security nat source rule-set LAN-to-VPN rule VPN-NAT-OFF match source-address 172.29.140.36/32
set security nat source rule-set LAN-to-VPN rule VPN-NAT-OFF match destination-address 10.125.0.0/16
set security nat source rule-set LAN-to-VPN rule VPN-NAT-OFF then source-nat off
set security nat source rule-set LAN-to-Internet from zone trust
set security nat source rule-set LAN-to-Internet to zone untrust
set security nat source rule-set LAN-to-Internet rule SNAT-RULE match source-address 0.0.0.0/0
set security nat source rule-set LAN-to-Internet rule SNAT-RULE then source-nat interface
set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address any
set security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address any
set security policies from-zone trust to-zone untrust policy trust-to-untrust match application any
set security policies from-zone trust to-zone untrust policy trust-to-untrust then permit
set security policies from-zone trust to-zone ipsec-vpn policy VPN-Policy match source-address K-LAN
set security policies from-zone trust to-zone ipsec-vpn policy VPN-Policy match destination-address IPSec-Remote-IP
set security policies from-zone trust to-zone ipsec-vpn policy VPN-Policy match application any
set security policies from-zone trust to-zone ipsec-vpn policy VPN-Policy then permit tunnel ipsec-vpn IPSec-VPN
set security policies from-zone ipsec-vpn to-zone trust policy VPN-Policy-In match source-address IPSec-Remote-IP
set security policies from-zone ipsec-vpn to-zone trust policy VPN-Policy-In match destination-address K-LAN
set security policies from-zone ipsec-vpn to-zone trust policy VPN-Policy-In match application any
set security policies from-zone ipsec-vpn to-zone trust policy VPN-Policy-In then permit tunnel ipsec-vpn IPSec-VPN
set security zones security-zone trust address-book address IPSec-Remote-IP 172.29.140.36/32
set security zones security-zone trust host-inbound-traffic system-services all
set security zones security-zone trust host-inbound-traffic protocols all
set security zones security-zone trust interfaces vlan.0
set security zones security-zone trust interfaces lo0.0
set security zones security-zone untrust screen untrust-screen
set security zones security-zone untrust host-inbound-traffic system-services ike
set security zones security-zone untrust host-inbound-traffic system-services ssh
set security zones security-zone untrust host-inbound-traffic system-services ping
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services dhcp
set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services tftp
set security zones security-zone untrust interfaces pp0.0
set security zones security-zone ipsec-vpn address-book address IPSec-Remote-IP 10.125.0.0/16
set interfaces fe-0/0/0 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces fe-0/0/1 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces fe-0/0/2 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces fe-0/0/3 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces at-1/0/0 encapsulation ethernet-over-atm
set interfaces at-1/0/0 atm-options vpi 8
set interfaces at-1/0/0 unit 0 encapsulation ppp-over-ether-over-atm-llc
set interfaces at-1/0/0 unit 0 vci 8.35
set interfaces lo0 unit 0 family inet address 172.29.140.36/32
set interfaces pp0 unit 0 ppp-options pap default-password "$9$PASSWORD"
set interfaces pp0 unit 0 ppp-options pap local-name "my-login@isp.com.au"
set interfaces pp0 unit 0 ppp-options pap local-password "$9$PASSWORD"
set interfaces pp0 unit 0 ppp-options pap passive
set interfaces pp0 unit 0 pppoe-options underlying-interface at-1/0/0.0
set interfaces pp0 unit 0 pppoe-options auto-reconnect 10
set interfaces pp0 unit 0 pppoe-options client
set interfaces pp0 unit 0 no-keepalives
set interfaces pp0 unit 0 family inet negotiate-address
set interfaces vlan unit 0 family inet address 192.168.20.1/24
set routing-options static route 0.0.0.0/0 qualified-next-hop pp0.0
set protocols stp
set vlans vlan-trust vlan-id 3
set vlans vlan-trust l3-interface vlan.0