[Contents] [Prev] [Next] [Index] [Report an Error]

Dynamically Assigned Tunnels

The following examples are based on this network configuration (see Figure 3):

Figure 3: IPSec Dynamic Endpoint Tunneling Topology

Image g017076.gif

The examples in this section show the following configurations:

Note: All the configurations are given for the Juniper Networks router terminating dynamic endpoint connections.

Configuring a Next-Hop Style Service Set with Link-Type Tunnels

access {
profile demo-access-profile client * {
ike {
allowed-proxy-pair {
remote 0.0.0.0/0 local 0.0.0.0/0; # ANY to ANY
}
pre-shared-key {
ascii-text keyfordynamicpeers;
}
interface-id demo-ipsec-interface-id;
}
}
services {
service-set demo-service-set {
next-hop-service {
inside-service-interface sp-1/0/0.1;
outside-service-interface sp-1/0/0.2;
}
ipsec-vpn-options {
local-gateway 10.1.1.1;
ike-access-profile demo-ike-access-profile;
}
}
}
}

Note: Including the ike-access-profile statement enables the software to incorporate implicit proposals for dynamic endpoint authentication. You do not need to configure IKE or IPSec proposals explicitly.

interfaces {
sp-0/0/0 {
unit 0 {
family inet;
}
unit 1 {
family inet;
service-domain inside;
}
unit 2 {
family inet;
service-domain outside;
}
unit 3 {
family inet;
service-domain inside;
dial-options {
ipsec-interface-id demo-ipsec-interface-id;
dedicated;
}
}
unit 4 {
family inet;
service-domain inside;
dial-options {
ipsec-interface-id demo-ipsec-interface-id;
dedicated;
}
}
}
}

The following results are obtained:

Configuring a Next-Hop Style Service-Set with Policy-Based Tunnels

access {
profile demo-access-profile client * {
ike {
allowed-proxy-pair {
remote 172.16.2.0/24 local 172.16.1.0/24; #N-2 <==> #N-1
remote 172.16.3.0/24 local 172.16.1.0/24; #N-3 <==> #N-1
}
pre-shared-key {
ascii-text keyfordynamicpeers;
}
interface-id demo-ipsec-interface-id;
}
}
}
services {
service-set demo-service-set {
next-hop-service {
inside-service-interface sp-1/0/0.1;
outside-service-interface sp-1/0/0.2;
}
ipsec-vpn-options {
local-gateway 10.1.1.1;
}
ike-access-profile demo-ike-access-profile;
}
}

Note: Including the ike-access-profile statement enables the software to incorporate implicit proposals for dynamic endpoint authentication. You do not need to configure IKE or IPSec proposals explicitly.

interfaces {
sp-0/0/0 {
unit 0 {
family inet;
}
unit 1 {
family inet;
service-domain inside;
}
unit 2 {
family inet;
service-domain outside;
}
unit 3 {
family inet;
service-domain inside;
dial-options {
ipsec-interface-id demo-ipsec-interface-id;
mode shared;
}
}
}
}
# VRF configuration, if not inet.0
routing-instances {
demo-vrf {
instance-type vrf;
interface sp-0/0/0.1;
interface sp-0/0/0.3;
.....
}
}

The following results are obtained:


[Contents] [Prev] [Next] [Index] [Report an Error]