Juniper Netscreen - VPN Troubleshooting
Juniper Netscreen - VPN Troubleshooting
get sa active
Notes:
Notes:
The software applies stateless policing filters and CoS classification to the packet at the
ingress.
If the packet does not drop, the software performs a session lookup to determine whether the
packet belongs to an existing session. The Junos OS matches on six elements of traffic
information for this determinationsource IP address, destination IP address, source port
number, destination port number, protocol number, and a session token.
If the packet does not match an existing session, a new session is created. This process is
referred to as the first-packet path.
Next, the software performs the route lookup. If a route exists for the destination prefix, the
software takes the next step. Otherwise, it drops the packet.
The software determines the packets incoming zone by the interface through which it arrives.
The software also determines the packets outgoing zone by the forwarding lookup.
Based on incoming and outgoing zones, the corresponding security policy is determined and a
security policy lookup takes place. The software checks the packet against defined policies to
determine how to treat the packet.
The software creates and installs the session. Furthermore, the software caches the decisions
made for the first packet into a flow table, which subsequent packets of that flow use.
Subsequent packets of a flow are all subject to fast-path processing. The software takes the
following steps during fast-path processing:
The software applies packet forwarding features, which include the following:
commit
Notes:
The egrep outputs the capture into an easier to read format. It is not necessary to run this
command to read the capture file.
Capture is bidirectional
set interface "tunnel.<#>" mip <Mapped-IP> host <real-ip> netmask 255.255.255.255 vr "trust-
vr" !! If Needed
set ike p1-proposal "pre-g2-aes265-sha" preshare group2 esp aes256 sha-1 second 28800
set ike p2-proposal "nopfs-esp-aes256-sha" no-pfs esp aes256 sha-1 second 28800
set vpn "<vpn_name-#>" proxy-id local-ip <ip/cidr> remote-ip <ip/cidr> "ANY" !! Only
necessary if you NEED to define proxy-ids, for instance to Cisco devices
Notes:
Create more vpns (like vpn_name-1) for each proxy-id combination needed
NHTB routes are necessary if binding multiple VPNs to the same tunnel interface (for instance,
when multiple proxy-IDs are required)
commit
commit
Notes