juniper防火墙动态VPN配置

一、拓扑图

墙规划三个安全区域:trust,untrust,dmz。

trust接口:ge-0/0/0 管理ip:192.168.1.1/24,公司办公区。

untrust接口:ge-0/0/1管理ip:100.100.100.1/24,接外部互联网。

dmz接口:ge-0/0/2管理ip:10.10.10.1/24,公司服务器区。

远程动态vpn客户端分配地址池范围:172.16.10.0/24,分配的地址段:172.16.10.10---172.16.10.250。

二、具体配置

1、配置主机名,root账号密码,web分发pulse客户端产生证书方式https

set system host-name srx2
set system root-authentication encrypted-password "$1$iu2fOc8K$3htfeb/bly.2BfRoDsqVX."
set system services web-management https system-generated-certificate

2、配置接口ip地址

set interfaces ge-0/0/0 unit 0 family inet address 192.168.1.1/24
set interfaces ge-0/0/1 unit 0 family inet address 100.100.100.1/24
set interfaces ge-0/0/2 unit 0 family inet address 10.10.10.1/24

3、配置vpn phase 1参数

set security ike policy ike-pol1 mode aggressive
set security ike policy ike-pol1 proposal-set standard
set security ike policy ike-pol1 pre-shared-key ascii-text "$9$/kW.Au1Srv7-wRh-wYgUD9Ap0RhylK8xN"
set security ike gateway gate-dynamic ike-policy ike-pol1
set security ike gateway gate-dynamic dynamic hostname srx2
set security ike gateway gate-dynamic dynamic connections-limit 50
set security ike gateway gate-dynamic dynamic ike-user-type group-ike-id
set security ike gateway gate-dynamic external-interface ge-0/0/1
set security ike gateway gate-dynamic xauth access-profile dynamic-users

4、配置vpn phase 2参数

set security ipsec policy ipsec-pol1 proposal-set standard
set security ipsec vpn dynamic-vpn ike gateway gate-dynamic
set security ipsec vpn dynamic-vpn ike ipsec-policy ipsec-pol1

5、配置动态vpn参数

set security dynamic-vpn access-profile dynamic-users
set security dynamic-vpn clients all remote-protected-resources 192.168.1.0/24 
set security dynamic-vpn clients all remote-protected-resources 10.10.10.0/24
set security dynamic-vpn clients all remote-exceptions 0.0.0.0/0
set security dynamic-vpn clients all ipsec-vpn dynamic-vpn
set security dynamic-vpn clients all user client1
set security dynamic-vpn clients all user client2
set security dynamic-vpn clients all user louis.yang

6、配置安全策略

set security policies from-zone trust to-zone untrust policy p2 match source-address any
set security policies from-zone trust to-zone untrust policy p2 match destination-address any
set security policies from-zone trust to-zone untrust policy p2 match application any
set security policies from-zone trust to-zone untrust policy p2 then permit
set security policies from-zone dmz to-zone untrust policy p3 match source-address any
set security policies from-zone dmz to-zone untrust policy p3 match destination-address any
set security policies from-zone dmz to-zone untrust policy p3 match application any
set security policies from-zone dmz to-zone untrust policy p3 then permit
set security policies from-zone untrust to-zone trust policy dynamic-vpn-policy match source-address any
set security policies from-zone untrust to-zone trust policy dynamic-vpn-policy match destination-address any
set security policies from-zone untrust to-zone trust policy dynamic-vpn-policy match application any
set security policies from-zone untrust to-zone trust policy dynamic-vpn-policy then permit tunnel ipsec-vpn dynamic-vpn
set security policies from-zone untrust to-zone dmz policy p4 match source-address any
set security policies from-zone untrust to-zone dmz policy p4 match destination-address any
set security policies from-zone untrust to-zone dmz policy p4 match application any
set security policies from-zone untrust to-zone dmz policy p4 then permit tunnel ipsec-vpn dynamic-vpn

7、配置安全区域
set security zones security-zone trust interfaces ge-0/0/0.0
set security zones security-zone untrust host-inbound-traffic system-services ike
set security zones security-zone untrust host-inbound-traffic system-services https
set security zones security-zone untrust host-inbound-traffic system-services ping
set security zones security-zone untrust interfaces ge-0/0/1.0
set security zones security-zone dmz interfaces ge-0/0/2.0

8、配置access profile

set access profile dynamic-users client client1 firewall-user password "$9$yjQeMXVwgUjq7-jqmfn6revW7-bs2aGD"
set access profile dynamic-users client client2 firewall-user password "$9$nmBV9tOhSeX7V1R7VwYZG69Ap1RcylMLx"
set access profile dynamic-users client louis.yang firewall-user password "$9$upaWBRSvWxwYoreYoJGq.0BIEreM8X-bs"
set access profile dynamic-users address-assignment pool dynamic-pool
set access address-assignment pool dynamic-pool family inet network 172.16.10.0/24
set access address-assignment pool dynamic-pool family inet range dynamic-range low 172.16.10.10
set access address-assignment pool dynamic-pool family inet range dynamic-range high 172.16.10.250
set access address-assignment pool dynamic-pool family inet xauth-attributes primary-dns 202.96.134.133/32
set access firewall-authentication web-authentication default-profile dynamic-users

三、验证

在客户端ping trust安全区域PC:192.168.1.6,DMZ区域PC:10.10.10.254通。

远程客户端获取到地址池的IP172.16.10.11,客户端连接到墙。

具体验证(略)

四、总结

juniper srx防火墙动态vpn的配置,关键是我加绿的部分。远程被保护资源和放行vpn隧道。配置排错部分推荐官网kb:https://kb.juniper.net/InfoCenter/index?page=content&id=KB17220&actp=search

时间: 2024-10-27 10:44:51

juniper防火墙动态VPN配置的相关文章

juniper防火墙 L2TP VPN配置

juniper防火墙 L2TP  VPN配置 建立L2TP_POOL 创建连接的用户: 创建用户组: 更改L2TP的连接池: 更改L2TP的隧道: 设置防火墙的策略: Win7连接:

juniper srx 动态VPN 配置

juniper srx系列防火墙的动态VPN又叫dynamic vpn ,可以通过电脑客户端远程拨入到设备所在网络中.目前低端系列的防火墙如srx100 srx210 srx240 srx550 srx650设备默认支持两个动态VPN并发授权,超过两个授权需要开通相应的license .srx300系列需要高版本才能支持,前段时间测试过300系列15.1D49是不支持动态VPN的,好像需要升级到D51版本以上. 开启https set system services web-management

Juniper 防火墙建立VPN不成功:Phase1:Retransmission

Juniper防火墙建立VPN不成功,日志中出现下面的提示:Phase 1: Retransmission limit has been reached. 下面是从Juniper资料库中查到的相关资料,按照Juniper资料库的办法好像并没有彻底解决问题,不过可以参考一下Juniper防火墙的排错思路. Synopsis: VPN won't come up; It is failing in Phase 1, with Retransmission limit has been reached

cisco防火墙点对点VPN配置样例

需求:两端防火墙同为cisco5500系列,实现点点VPN连接,并实现nat与vpn共存 配置实例: tunnel-group 210.1.1.22 type ipsec-l2ltunnel-group 210.1.1.22 ipsec-attributes ikev1 pre-shared-key ***** (*为对方共享秘钥) crypto ipsec ikev1 transform-set VPN-B esp-3des esp-sha-hmac crypto map IPSEC_MP 1

H3C 低端防火墙L2TP VPN配置

<GTECH>sys System View: return to User View with Ctrl+Z. [GTECH]dis curr # sysname GTECH # l2tp enable    //开启L2TP功能,必选 # firewall packet-filter enable firewall packet-filter default permit # connection-limit enable connection-limit default deny con

ASA防火墙IPSEC VPN配置

一.IPSEC  VPN (site to site) 第一步:在外部接口启用IKE协商 crypto isakmp enable outside 第二步:配置isakmp协商策略 isakmp 策略两边要一致,可设置多个策略模板,只要其中一个和对方匹配即可 isakmp policy 5 authenticationpre-share    //配置认证方式为预共享密钥 isakmp policy 5 encryption des            //配置isakmp 策略的加密算法 i

华为USG防火墙 IPsec VPN配置

实验拓扑 使用华为ensp 1.2.00.370模拟器 实验需求 USG-1和USG-2模拟企业边缘设备,分别在2台设备上配置NAT和IPsec VPN实现2边私网可以通过VPN互相通信 实验配置 R1 IP地址配置省略 USG-1配置 [USG-1]firewall zone trust          //配置trust区域 [USG-1-zone-trust]add interface g0/0/0    //将接口加入trust区域 [USG-1-zone-trust]quit [US

juniper防火墙基于路由的IPsec VPN配置

一.环境说明 北京公司需要和上海分公司建立安全通信的VPN,便于北京总公司与上海分公司资源共享安全. 需建立两条子网通道规划地址如下: 北京总公司地址规划: 外网接口地址:218.23.23.23/24 内部VLAN地址:10.0.0.0/24  10.0.1.0/24 上海分公司地址规划: 外网接口地址:218.241.241.23/24 内部VLAN地址:172.173.0.0/24  172.173.3.0/24 二.开始配置IPsec VPN 北京总公司配置: 配置外网接口地址为非信任区

juniper防火墙配置失误导致断网

我所在的公司用的是juniper srx 550防火墙.个人感觉juniper的设备还是很人性化的.一些常用配置都比较容易理解,比如说NAT ,ACL等. 因为业务需要,我要在防火墙上启懂dy-vpn ,就是动态VPN.在网上找了很久,就只能扎到SRX240的一个案例.只能先对照着试一下.结果发现确实有配置不一致的地方.只能摸索着调试.不凑巧的是我调试的设备是生产环境,更不凑巧的是我调试出了问题,导致部分网络中断,之后又莫名其妙的无法管理设备,在之后的一个下午设备各种网络不稳定,在之后的晚上设备