1 APPLICATION NOTE Dynamic VPN Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1
2 Table of Contents Introduction Scope Design Considerations Hardware Requirements Software Requirements Client Software Requirements Common Deployment Scenario Configuration Configuring the VPN Tunnels Configuring the Authentication Parameters Associating VPNs Users with Dynamic VPN Configurations Using a RADIUS Server for User Authentication Configuration Using the VPN Wizard J-Web and Remote Access Portal Isolation Monitoring Licensing Summary About Juniper Networks Table of Figures Figure 1: Deployment Scenario Figure 2: Authentication Portal Figure 3: VPN Authentication Figure 4: Configuration Scenario Copyright 2011, Juniper Networks, Inc.
3 Introduction Remote access VPNs, sometimes called dial-up VPNs, have been supported in ScreenOS and Juniper Networks Junos operating system devices for some time. However, traditional remote access VPNs require client software in order to establish the VPN and so installing and distributing the client software to all remote devices becomes a challenge. The dynamic VPN feature available on Juniper Networks SRX Series Services Gateways allows administrators to provide IPsec access to an SRX Series gateway while offering a simple way to distribute the client software through the use of a secure Web portal. Scope The purpose of this application note is to provide dynamic VPN configuration examples and some common deployment scenarios. Design Considerations Branch SRX Series gateways can be deployed in standalone or redundant configurations. In this application note it is assumed that a standalone device is used to terminate the VPN. However, the same concepts apply to clustered devices. Hardware Requirements Branch SRX Series Services Gateways (Juniper Networks SRX100 Services Gateway, SRX200 line, and SRX650 Services Gateway) Software Requirements Junos OS Release 10.4r1 or later Client Software Requirements Windows XP, Vista, or Windows 7 Common Deployment Scenario The most common deployment scenario is to provide VPN access to remote clients connected through a public network (Internet). A public IP address is assigned to one of the gateway s interfaces (normally the untrust interface). Remote clients can access the VPN portal and, after being authenticated, they can download and install the VPN client. Client 1 Public Address Normally, DHCP-assigned IP addresses(can be private addresses when the client is behind NAT) Head-End /24 Trust Zone Client N INTERNET Untrust Zone Branch SRX Series Tunnel Address Assigned useing modconfig from an address pool configured in the head end Untrust Interface Address Public IP address reachable from the Internet Figure 1: Deployment Scenario Copyright 2011, Juniper Networks, Inc. 3
4 Assume that the untrust zone in the SRX Series device at the head-end is connected to the Internet, with a public static IP. The head-end could also be connected through NAT, as long as the interface connected to the untrust zone is reachable. For this example, assume that the untrust interface is configured with the address. The process for a client to access the VPN is as follows: 1. Clients trying to access the VPN must contact the Web authentication portal by establishing an http(s) connection to the interface, configured to terminate the tunnels (in this example, doing an 2. The clients are redirected to the authentication portal, after which they are prompted for their user credentials. Figure 2: Authentication Portal 3. After successful authentication, the server determines if the VPN software is installed in the clients machines. The server also makes sure that the software version installed in the clients machines is the latest. 4. If the clients have no VPN software installed, or they have an old version, a new software push is initiated after which the software is installed. 5. The VPN software is launched, and a new Web authentication occurs. If this authentication process is successful, the clients download the latest configuration options from the server (this way the clients always have the latest configuration at the time they attempt to build a tunnel). Figure 3: VPN Authentication 6. A tunnel is established, a new IKE authentication is performed, and an IP address is assigned to the VPN clients (which could be allocated from a local address pool or an external RADIUS server) after which traffic is allowed through the tunnel. This second authentication phase is done as part of the tunnel setup, using IPsec extended authentication (XAuth). After the VPN software has been installed, the users can access the VPN by either logging in to the portal or by launching the VPN software directly. In both cases the VPN client authenticates with the SRX Series device and downloads the latest available configuration for each user. 4 Copyright 2011, Juniper Networks, Inc.
5 Configuration For this scenario assume that the client authentication and address assignments are done locally, without the use of an external RADIUS server. The configuration can be divided into three sections: configuring the VPN parameters, configuring the authentication and address assignment parameters, and associating the VPNs with the users who are accessing them. Public Address Dynamically-assigned IP, unknown to the gateway Trust Interface ge-0/0/1.0 with address /24 Client 1 Head-End /24 Trust Zone Client N INTERNET Untrust Zone Branch SRX Series Tunnel Address Assigned from the /24 pool using local authentication with a local address pool Untrust Interface ge-0/0/15.0 Public IP address reachable from the Figure 4: Configuration Scenario The following sections explain the different configuration options for each of these steps. Configuring the VPN Tunnels VPN tunnels are configured in the same way as traditional IPsec VPN tunnels. However, due to the specific requirements of these types of VPNs, not all IPsec VPN options are supported. In particular: Tunnels must be configured with extended authentication (XAuth). XAuth is required in order to obtain username/ password information during the IPsec negotiation and to be able to push an IP address (an optional DNS/WINS server address) to the client. Only policy-based VPNs are supported. Traffic allowed from the VPN can be controlled by pushing some routes to the client, as part of the client s configuration. The VPN client only supports any/any proxy IDs, which are derived from the security policies used to map the traffic to one of the tunnels. The security policy that is used for remote access clients must permit all traffic. Only preshared keys are supported for phase 1 authentication. However, since these VPNs use XAuth authentication, in most deployments it is possible to use the same preshared key for all the remote clients. Of course, each client/ user has different username/passwords assigned to use during the extended authentication phase. It is possible to configure a single VPN that is shared by all remote clients by using either shared or group IKE IDs. When a single VPN is shared, the total number of simultaneous connections to the gateway cannot be larger than the number of dynamic VPN licenses installed. That is, when configuring a shared/group IKE ID gateway, it is possible to configure the maximum number of connections to be larger than the number of installed dynamic VPN licenses. However, if at any given time a new connection attempt is made that would result in a number of concurrent connections greater than what is allowed by the license, the connection is denied. Copyright 2011, Juniper Networks, Inc. 5
6 You are now in a position to configure an IPsec VPN to be used for dynamic VPN access. In order to simplify the configuration you can make use of predefined proposals for both phase 1 and phase 2 negotiations. #Define the IKE gateway #Use aggressive mode set security ike policy ike-dyn-vpn-policy mode aggressive set security ike policy ike-dyn-vpn-policy proposal-set standard #Use pre-shared keys set security ike policy ike-dyn-vpn-policy pre-shared-key ascii-text $9$KHxWXNs2aikPdbkP5Q9CKM8 set security ike gateway dyn-vpn-local-gw ike-policy ike-dyn-vpn-policy #Using group-ike IDs #Each client will have its own IKE-ID, which is derived from the username and group ID (dynvpn) set security ike gateway dyn-vpn-local-gw dynamic hostname dynvpn set security ike gateway dyn-vpn-local-gw dynamic ike-user-type group-ike-id #The connection limit should not be larger than the number of installed licenses set security ike gateway dyn-vpn-local-gw dynamic connections-limit 10 #Specify the interface to listen for connections #This is important both for IKE and also for the authentication portal set security ike gateway dyn-vpn-local-gw external-interface ge-0/0/15.0 #Xauth profile determines how to authenticate the user, assign addresses and access parameters set security ike gateway dyn-vpn-local-gw xauth access-profile dyn-vpn-accessprofile #Define the IPSEC vpn set security ipsec policy ipsec-dyn-vpn-policy proposal-set standard set security ipsec vpn dyn-vpn ike gateway dyn-vpn-local-gw set security ipsec vpn dyn-vpn ike ipsec-policy ipsec-dyn-vpn-policy Remote access tunnels are supported by only the use of policy-based VPNs. Therefore, you need to configure a security policy that allows encrypted traffic from the clients which, in the deployment scenario described in this application note, comes from the untrust zone to the trust networks. Note: If you have a deny all rule for logging purposes, it is important that this policy be inserted before the deny rule or any other rules that match on this type of traffic. set security policies from-zone untrust to-zone trust policy dyn-vpn-policy match source-address any set security policies from-zone untrust to-zone trust policy dyn-vpn-policy match destination-address any set security policies from-zone untrust to-zone trust policy dyn-vpn-policy match application any #Note how the policy allows traffic only from the dyn-vpn IPSec vpn. set security policies from-zone untrust to-zone trust policy dyn-vpn-policy then permit tunnel ipsec-vpn dyn-vpn 6 Copyright 2011, Juniper Networks, Inc.
7 It is also important to make sure that the interface where the tunnels are terminated is configured to accept both IKE connections and HTTPS requests. This can be done by allowing IKE and HTTPS host-inbound-traffic on the security zone that is hosting the IKE listener interface (normally the untrust zone). set security zone security-zone untrust interface ge-0/0/15.0 host-inbound-traffic system-services ike set security zone security-zone untrust interface ge-0/0/15.0 host-inbound-traffic system-services https #We can also allow http traffic on this interface. If an http request is received the device will send a redirect to the login page that uses the https protocol set security zone security-zone untrust interface ge-0/0/15.0 host-inbound-traffic system-services http Configuring the Authentication Parameters The authentication parameters are configured under an access profile. Given the different places where authentication can occur, the profile is referenced under the IPsec VPN configuration (as can be seen in the previous section) the dynamic-vpn stanza and the firewall authentication. #dyn-vpn-access-profile definition used for xauth, firewall-auth and dynamic-vpn #This example shows a single client, but more clients can be added below set access profile dyn-vpn-access-profile client test firewall-user password $9$uY4o0EyMWxdwgX7 set access profile dyn-vpn-access-profile client user1 firewall-user password $9$uY4o0EyMWxdwgX7 set access profile dyn-vpn-access-profile client user2 firewall-user password $9$uY4o0EyMWxdwgX7 #This access profile uses local authentication and address assignment by pointing to a local address pool set access profile dyn-vpn-access-profile address-assignment pool dyn-vpn-addresspool set access address-assignment pool dyn-vpn-address-pool family inet network /24 set access address-assignment pool dyn-vpn-address-pool family inet xauthattributes primary-dns /32 #Finally note how the access profile is used for web-auth (for the dynamic-vpn portal and download). set access firewall-authentication web-authentication default-profile dyn-vpnaccess-profile Please note how the access profile is used for XAuth and firewall authentication. To be precise, any authentication profile can be used for firewall authentication, and it does not have to be the same used for dynamic VPN access. However, if no access profile is configured for firewall authentication, the authentication portal is not enabled. Lastly, it is worth mentioning that the address pool could belong to a subnet directly connected to the SRX Series device. As an example, consider the network diagram in Figure 1. If you were to choose an IP pool within the /24 subnet, say the to , the SRX Series device would have to respond to ARP requests to the addresses in the pool from machines in the trust zone. This can be achieved by configuring proxy-arp as shown in the following example, and it is only needed if the configured pool belongs to one of the subnets of the interfaces directly connected to the SRX Series device. Of course, if these addresses do not belong to the addresses of directly connected interfaces, other devices in the network need a route pointing to the pool in order to reach the client machines behind the tunnel. #Assuming the ge-0/0/1.0 interface is connected to the trust network, and that the IP pool used for config mode #is included in this interface s subnet set security nat proxy-arp interface ge-0/0/1.0 address to Copyright 2011, Juniper Networks, Inc. 7
8 Associating VPNs Users with Dynamic VPN Configurations At this point you have the IPsec VPN configuration you want to use for the dynamic VPN tunnels, and you have created an access profile that is used for IPsec extended authentication (XAuth). Every time a user attempts to establish a dynamic VPN connection to an SRX Series device, the latest available configuration is pushed to the client. In order to do this, there must be a way to associate IPsec VPN configurations with client names. This last configuration example shows precisely how to do this, by declaring the authentication profile to be used with the dynamic VPN portal, and identifying the list of clients using a particular IPsec VPN configuration. #Specify the authentication profile used for the dyn-vpn portal #This profile should be the same as the one used for xauth set security dynamic-vpn access-profile dyn-vpn-access-profile #Specify a list of clients, with the ipsec vpn used set security dynamic-vpn clients all ipsec-vpn dyn-vpn set security dynamic-vpn clients all user test set security dynamic-vpn clients all user user1 set security dynamic-vpn clients all user user2 #It is also possible to define the set of resources that will be accessible through the tunnel. #Destinations matching any of the configured remote-protected-resources will be sent through the tunnel set security dynamic-vpn clients all remote-protected-resources /8 #Destinations matching the exceptions will not be tunneled and will be sent out in cleat text set security dynamic-vpn clients all remote-exceptions /0 As part of the dynamic VPN profile, it is necessary to configure two prefix lists the remote-protected-resources and the remote-exceptions. These lists allow administrators to configure which traffic is sent through the IPsec tunnel and which traffic is bypassed. Traffic to a destination matching any of the prefixes in the remote-protected-resources is sent through the tunnel, while traffic matching any of the prefixes in the remote exceptions is sent in clear text. Using a RADIUS Server for User Authentication If, instead of using local authentication, an external RADIUS server is used to authenticate users and do the address assignment, the access profile must be changed to point to a RADIUS server as shown in the following: set access profile dyn-vpn-access-profile authentication-order radius set access profile dyn-vpn-access-profile radius-server secret $9$D8H.5n/tIEyQFEylKx7jHq set access firewall-authentication web-authentication default-profile dyn-vpnaccess-profile Note: As of Junos OS Release 10.4, when using RADIUS you must also include the usernames as part of dynamic VPN client configuration. Because the SRX Series supports multiple dynamic VPNs simultaneously, each with different configurations, this step is required in order to determine which configuration to use for a given user. The rest of the configuration remains unchanged, but now the RADIUS server must pass on the IP address and other parameters assigned to the client during the IPsec negotiation. The following standard RADIUS attributes are used for address assignment: Framed-IP-Address Framed-IP-Netmask 8 Copyright 2011, Juniper Networks, Inc.
9 It is also possible to pass DNS and WINS servers to the client, using the following vendor-specific attributes taken from a RADIUS dictionary (the format is RADIUS-specific, but it contains all the required information to define the same attributes in a RADIUS server): MACRO Juniper-VSA(t,s) 26 [vid=2636 type1=%t% len1=+2 data=%s%] ATTRIBUTE Juniper-Primary-Dns ATTRIBUTE Juniper-Primary-Wins ATTRIBUTE Juniper-Secondary-Dns ATTRIBUTE Juniper-Secondary-Wins Juniper-VSA(31, ipaddr) r Juniper-VSA(32, ipaddr) r Juniper-VSA(33, ipaddr) r Juniper-VSA(34, ipaddr) r As an example, the test user configured before you use local authentication can be configured in a free RADIUS server by adding the following lines to the /etc/raddb/users file (it is assumed that the dictionary file includes the declaration for the Juniper-Primary-Dns attribute): test Auth-Type := Local, User-Password == test Service-Type = Login-User, Framed-IP-Address = , Framed-IP-Netmask = , Juniper-Primary-Dns = Configuration Using the VPN Wizard A configuration wizard has been added as part of the Juniper Networks J-Web Software management interface in Junos OS Release This wizard is not meant to provide all the options available for the configuration of the remote access VPN (or dynamic VPN) feature in the CLI, but rather to simplify the most common use case. It is targeted for deployments that do not require RADIUS authentication nor use multiple different VPN profiles (for example, by having different authentication/encryption parameters for different users). The configuration using the wizard is much simpler than through the CLI, as it automates most of the provisioning. The first step is to launch the VPN wizard (found under the Wizards -> VPN Wizard menu) and select the Remote Access VPN type, as shown in the following. Copyright 2011, Juniper Networks, Inc. 9
10 The wizard provides a workflow-oriented way to configure the feature and pre-provisions some of the values whenever possible such as the VPN name, which is always wizard_dyn_vpn. Following with this example, you want to provide access to the /24 subnet connected to the trust zone while you expect the connections to be done through the ge-0/0/15.0 interface in the untrust zone. When selecting the interface connected to the public network, the wizard automatically shows the zone to which the interface is bound. If no zone has been assigned, users choose a zone to bind the external interface to via a drop-down box. The next page allows users to modify the encryption and authentication parameters used for the VPN, along with some other VPN-related options. Because the configuration is automatically pushed to each client before the client connects using a secure channel, sensible defaults are provided that work in most situations, which make this configuration step completely optional. Note how this allows the wizard to pre-generate pre-shared keys used for IKE, or the remote IKE identity, as those values are automatically relayed to the remote access VPN client. 10 Copyright 2011, Juniper Networks, Inc.
11 Continuing with the workflow, you can configure the list of users allowed with their respective passwords, the address of the pool used to assign an IP to the users, and the addresses of the DNS and WINS servers passed to them (the last two parameters are optional). You are finally presented with a review page from which you can commit the configuration. J-Web and Remote Access Portal Isolation The Web management interface (J-Web) and the portal used to authenticate dynamic VPN users leverage the same HTTP server infrastructure, configurable under the [system services web-management] hierarchy. All interfaces listed under the interface section answer HTTP or HTTPS requests (or both, based on the configuration). It is possible to disable J-Web access on the interfaces used for dynamic VPN access. On releases previous to 10.4, in order to configure the dynamic VPN feature, it was mandatory to add the IKE listener interface to the list of management interfaces for HTTPS. In Junos OS Release 10.4, every interface used for dynamic VPN access automatically accepts HTTP and HTTPS connections to the dynamic VPN portal. If an interface is used for dynamic VPN access (that is, if an interface is configured under the IKE listener interfaces in an IPsec VPN profile used for dynamic VPN access) and that interface is not configured for Web management access, only access to the dynamic VPN portal is allowed effectively disabling J-Web access on that interface. Copyright 2011, Juniper Networks, Inc. 11
12 Since an interface can be configured for dynamic VPN access by adding it to the IKE listener interfaces, Web management access or both, access to the dynamic VPN portal depends on which interface a request comes from and how that interface is configured. The following table summarizes the different combinations. Table 1: Sharing the same interface to access J-web and a dynamic VPN Request Dynamic VPN access only J-Web access only Both J-Web and dynamic VPN access enabled HTTP(S) request to the URL User is redirected to the dynamic VPN portal User is redirected to the J-Web login page User is redirected to the dynamic VPN portal HTTP(S) request to the dynamic VPN URL Dynamic VPN portal is shown Page Not Found is returned User is redirected to the J-Web login page HTTP(S) request to the management-url Page Not Found is returned User is redirected to the J-Web login page User is redirected to the J-Web login page The management-url configuration option can used to specify the URL used to access the management interface (J-Web) when a particular interface is used both for dynamic VPN and management. By default, a request arriving from an interface enabled both for dynamic VPN and J-Web is redirected to the dynamic VPN portal. When the management-url is configured, a request to http(s)://<interface-address>/<management-url> presents the management interface. Monitoring Dynamic VPN clients use IPsec tunnels and, therefore, can be monitored using the same commands used to monitor site-to-site or dial-up IPsec tunnels. In particular, the show security ike security-associations command displays all the list of SAs in the system and their status. #run show security ike security-associations Index Remote Address State Initiator cookie Responder cookie Mode UP 37b45aa1469e488b 7d e2e6 Aggressive The show security ike active-peer command can be used to display in a tabular form the list of all connected users, their remote IP addresses, and the address assigned to them using XAuth. # run show security ike active-peer Remote Address Port Peer IKE-ID XAUTH username Assigned IP testdynvpn test Similarly, the show security ipsec security-associations command displays the status of the Phase 2 SAs. # run show security ipsec security-associations Total active tunnels: 1 ID Gateway Port Algorithm SPI Life:sec/kb Mon vsys < ESP:aes-128/sha1 9c23b7a9 2862/ root > ESP:aes-128/sha1 c72c8f / root 12 Copyright 2011, Juniper Networks, Inc.
13 Additionally, the show security dyamic-vpn users command can be used to display the number of concurrent connections for each connected user and the negotiated parameters for that user. # run show security dynamic-vpn users User: test, Number of connections: 1 Remote IP: IPSEC VPN: dyn-vpn IKE gateway: dyn-vpn-local-gw IKE ID : testdynvpn IKE Lifetime: IPSEC Lifetime: 3600 Status: CONNECTED Licensing All devices ship with a two-user dynamic VPN license. More licenses can be purchased, up to a certain maximum determined by each platform. The show system license command can be used to display the number of licenses installed and currently used. show system license License usage: Licenses Licenses Licenses Expiry Feature name used installed needed av_key_kaspersky_engine :00:00 UTC anti_spam_key_sbl :00:00 UTC wf_key_surfcontrol_cpa :00:00 UTC idp-sig :00:00 UTC dynamic-vpn :00:00 UTC ax411-wlan-ap permanent As previously mentioned, client connections are rejected when the number of licenses used reaches the number of installed licenses. When users disconnect, the licenses are released so only the maximum number of simultaneous users is enforced (not the total number of configured clients). Summary The dynamic VPN feature provides a simple way to deploy IPsec VPN access for remote clients. With this feature, client software can be centrally distributed and configured, simplifying the deployment complexity and cost. Small enterprises can leverage this functionality to provide remote access without requiring any additional client software or costly VPN concentrators. Large-scale deployments are better serviced deploying a full-featured SSL VPN solution, as the one provided by the Juniper Networks SA Series SSL VPN Appliances product line. Copyright 2011, Juniper Networks, Inc. 13
14 About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: please contact your Juniper Networks representative at or authorized reseller. Copyright 2010 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Feb 2011 Printed on recycled paper 14 Copyright 2011, Juniper Networks, Inc.
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
Network Configuration Example Configuring a Single SRX Series Device in a Branch Office Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
IMPLEMENTATION GUIDE WAN OPTIMIZATION AND IPSEC FOR THE BRANCH OFFICE Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks does not warrant or guarantee
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
APPLICATION NOTE JUNIPER NETWORKS SRX SERIES AND J SERIES NAT FOR ScreenOS USERS Understanding ScreenOS and Junos OS CLI Differences Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction.........................................................................................
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
Network Configuration Example Configuring Branch SRX Series for MPLS over IPsec (1500-byte MTU) Published: 2014-12-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
APPLICATION NOTE Configuring and Deploying the AX411 Wireless Access Point Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction......................................................................................................3
APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center
VPN Configuration Guide Juniper Networks NetScreen / SSG / ISG Series equinux AG and equinux USA, Inc. 2009 equinux USA, Inc. All rights reserved. Under the copyright laws, this manual may not be copied,
Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide
Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,
Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Configuring Remote-Access VPNs via ASDM Created by Bob Eckhoff This white paper discusses the Cisco Easy Virtual Private Network (VPN) components, modes of operation, and how it works. This document also
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
Application Note J Series / SRX Series Remote Access VPN with XAuth Configuration and Troubleshooting Version 1.5 Richard Kim Technical Support Engineer Advanced JTAC June 2009 Juniper Networks, Inc. 1194
External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos firstname.lastname@example.org Global Protect SSL VPN Overview This document gives you an overview on how to configure
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Windows XP VPN Client Example Technote LCTN0007 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: email@example.com
IMPLEMENTATION GUIDE Remote Access Protection Best Practices for Implementing Remote Access Protection Using Juniper Networks SA Series SSL VPN Appliances, IDP Series Intrusion Detection and Prevention
DATASHEET JUNOS SPACE VIRTUAL CONTROL Product Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these
1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the IPSec VPN Wizard to configure IPSec VPN tunnels on the ProSecure Unified Threat Management (UTM) Appliance. The IP security
APPLICATION NOTE SRX SERIES AND J SERIES NETWORK ADDRESS TRANSLATION Configuring Next-Generation NAT on Juniper Networks SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
VPN Quick Configuration Guide Astaro Security Gateway V8 2010 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part,
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Application Note Limitation of Riverbed s Quality of Service (QoS) Riverbed s Quality of Service (QoS) configuration and limitations Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California
Configure IPSec VPN Tunnels With the Wizard This quick start guide provides basic configuration information about setting up IPSec VPN tunnels by using the VPN Wizard on the ProSafe Wireless-N 8-Port Gigabit
VPN Configuration Guide Cisco ASA 5500 Series 2010 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part, without the
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
GB-OS Version 5.4 Configuring GTA Firewalls for Remote Access IPSec Mobile Client, PPTP and L2TP RA201010-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220
DIGIPASS Authentication for Juniper ScreenOS With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 53 Disclaimer Disclaimer of Warranties and Limitations
Configuration Guide 5991-2120 April 2005 Virtual Private Network (VPN) VPN Using Preset Keys, Mode Config, and Manual Keys This Configuration Guide is designed to provide you with a basic understanding