[j-nsp] Help needed with IPSEC VPN on J-Series

ashish verma ashish.scit at gmail.com
Thu Mar 21 02:34:04 EDT 2013


Commit full?

Also do you a have static route for the peer gateway IP?
I tried the deactivate, commit, reactivate, commit method…no such luck :(







On 2013-03-20 2:12 PM, "Gabriel Blanchard" <gabe at teksavvy.ca> wrote:

>Same thing here, that or I had to
>
>deactivate security vpn <name>
>commit
>and reactivate.
>commit
>
>On 13-03-20 02:03 PM, Bjørn Tore wrote:
>> As I mentioned offline - I once had to reboot an SRX 240 after changing
>>IPSEC config, to make things come up. Might not be the case here, but
>>with the code quality these days - who knows..
>>
>> Bjørn Tore @ mobil
>>
>> Den 20. mars 2013 kl. 18:57 skrev Patrick Dickey
>><dickeypjeep at yahoo.com>:
>>
>>> I'd start to suspect the other side of the tunnel. What is your peer
>>>device?
>>>
>>>
>>>
>>> On Mar 20, 2013, at 11:55 AM, Bill Sandiford
>>><bill at telnetcommunications.com> wrote:
>>>
>>>> So I added the following configuration in.  The syntax was a little
>>>> different than what you sent, but basically the same thing (I think).
>>>>
>>>>> show configuration security policies
>>>> from-zone trust to-zone trust {
>>>>   policy policy1 {
>>>>       match {
>>>>           source-address any;
>>>>           destination-address any;
>>>>           application any;
>>>>       }
>>>>       then {
>>>>           permit;
>>>>       }
>>>>   }
>>>> }
>>>> default-policy {
>>>>   permit-all;
>>>> }
>>>>
>>>>
>>>>
>>>> Šbut still not working :(
>>>>
>>>>
>>>>
>>>>
>>>> On 2013-03-20 12:29 PM, "Aaron Dewell" <aaron.dewell at gmail.com> wrote:
>>>>
>>>>>
>>>>> You'll also need a policy which allows traffic from trust to trust,
>>>>>i.e.:
>>>>>
>>>>> set security policies from-zone trust to-zone trust match
>>>>>source-address
>>>>> any
>>>>> set security policies from-zone trust to-zone trust match
>>>>> destination-address any
>>>>> set security policies from-zone trust to-zone trust match protocol
>>>>>any
>>>>> set security policies from-zone trust to-zone trust then permit
>>>>>
>>>>> Cross-interface traffic is not allowed by default even within the
>>>>>same
>>>>> zone.
>>>>>
>>>>> On Mar 20, 2013, at 10:16 AM, Bill Sandiford wrote:
>>>>>> For the most part this J-series has always just acted as a router
>>>>>> without
>>>>>> any tunnels per se.  As such, I have always had all interfaces in
>>>>>>the
>>>>>> trust zone, as follows
>>>>>>
>>>>>> zones {
>>>>>>  security-zone trust {
>>>>>>      tcp-rst;
>>>>>>      host-inbound-traffic {
>>>>>>          system-services {
>>>>>>              any-service;
>>>>>>          }
>>>>>>          protocols {
>>>>>>              all;
>>>>>>          }
>>>>>>      }
>>>>>>      interfaces {
>>>>>>          all;
>>>>>>      }
>>>>>>  }
>>>>>> }
>>>>>>
>>>>>> Will this accomplish what you are suggesting?
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On 2013-03-20 11:52 AM, "Patrick Dickey" <dickeypjeep at yahoo.com>
>>>>>>wrote:
>>>>>>
>>>>>>> I don't remember if the J series behaves exactly like the SRXs
>>>>>>>when it
>>>>>>> comes
>>>>>>> to IPSec, but if it is make sure to put the st0.x interface into a
>>>>>>> security
>>>>>>> zone and have a security policy allowing the traffic.
>>>>>>>
>>>>>>> I believe that's only a requirement if you're running the enhanced
>>>>>>> services/security code on the J, but I think you have to be to get
>>>>>>> IPSec.
>>>>>>>
>>>>>>> HTH
>>>>>>>
>>>>>>>
>>>>>>> -----Original Message-----
>>>>>>> From: juniper-nsp-bounces at puck.nether.net
>>>>>>> [mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of Bill
>>>>>>> Sandiford
>>>>>>> Sent: Wednesday, March 20, 2013 8:47 AM
>>>>>>> To: juniper-nsp at puck.nether.net
>>>>>>> Subject: [j-nsp] Help needed with IPSEC VPN on J-Series
>>>>>>>
>>>>>>> Hi All,
>>>>>>>
>>>>>>> I need some help with an IPSEC tunnel that I just can't seem to get
>>>>>>> working
>>>>>>> on a J-6350.  I have been able to get the tunnels to come up, but
>>>>>>>can't
>>>>>>> seem
>>>>>>> to pass traffic over the tunnels
>>>>>>>
>>>>>>> I've done the usual things.  I've created an st0.0 interface and
>>>>>>>bound
>>>>>>> it
>>>>>>> to
>>>>>>> the tunnel using the bind-interface command.  I've created a static
>>>>>>> route
>>>>>>> and pointed it at the st0.0 interface.  I just can't seem to get
>>>>>>> traffic
>>>>>>> to
>>>>>>> pass over the tunnel.
>>>>>>>
>>>>>>> Any help or suggestions would be appreciated.  I'm also willing to
>>>>>>>put
>>>>>>> a
>>>>>>> $$$
>>>>>>> bounty on this for anyone that is willing to help me get it
>>>>>>>working via
>>>>>>> teamviewer.
>>>>>>>
>>>>>>> Regards,
>>>>>>> Bill
>>>>>>>
>>>>>>>
>>>>>>> _______________________________________________
>>>>>>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>>>>>>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>>>>>
>>>>>>
>>>>>> _______________________________________________
>>>>>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>>>>>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>>
>>> _______________________________________________
>>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>
>_______________________________________________
>juniper-nsp mailing list juniper-nsp at puck.nether.net
>https://puck.nether.net/mailman/listinfo/juniper-nsp


_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


More information about the juniper-nsp mailing list