Example: Configuring Dynamically Assigned Tunnels

The following examples are based on this network configuration (see Figure 3):

Figure 3: IPsec Dynamic Endpoint Tunneling Topology

Image g017076.gif

The examples in this section show the following configurations:

Note: All the configurations are given for the Juniper Networks router terminating dynamic endpoint connections.

Configuring a Next-Hop Style Service Set with Link-Type Tunnels

access {profile demo-access-profile client * {ike {allowed-proxy-pair {remote 0.0.0.0/0 local 0.0.0.0/0; # ANY to ANY}pre-shared-key {ascii-text keyfordynamicpeers;}interface-id demo-ipsec-interface-id;}}services {service-set demo-service-set {next-hop-service {inside-service-interface sp-1/0/0.1;outside-service-interface sp-1/0/0.2;}ipsec-vpn-options {local-gateway 10.1.1.1;ike-access-profile demo-ike-access-profile;}}}}

Note: Including the ike-access-profile statement enables the software to incorporate implicit proposals for dynamic endpoint authentication. You do not need to configure IKE or IPsec proposals explicitly.

interfaces {sp-0/0/0 {unit 0 {family inet;}unit 1 {family inet;service-domain inside;}unit 2 {family inet;service-domain outside;}unit 3 {family inet;service-domain inside;dial-options {ipsec-interface-id demo-ipsec-interface-id;dedicated;}}unit 4 {family inet;service-domain inside;dial-options {ipsec-interface-id demo-ipsec-interface-id;dedicated;}}}}

The following results are obtained:

Configuring a Next-Hop Style Service-Set with Policy-Based Tunnels

access {profile demo-access-profile client * {ike {allowed-proxy-pair {remote 172.16.2.0/24 local 172.16.1.0/24; #N-2 <==> #N-1remote 172.16.3.0/24 local 172.16.1.0/24; #N-3 <==> #N-1}pre-shared-key {ascii-text keyfordynamicpeers;}interface-id demo-ipsec-interface-id;}}}services {service-set demo-service-set {next-hop-service {inside-service-interface sp-1/0/0.1;outside-service-interface sp-1/0/0.2;}ipsec-vpn-options {local-gateway 10.1.1.1;}ike-access-profile demo-ike-access-profile;}}

Note: Including the ike-access-profile statement enables the software to incorporate implicit proposals for dynamic endpoint authentication. You do not need to configure IKE or IPsec proposals explicitly.

interfaces {sp-0/0/0 {unit 0 {family inet;}unit 1 {family inet;service-domain inside;}unit 2 {family inet;service-domain outside;}unit 3 {family inet;service-domain inside;dial-options {ipsec-interface-id demo-ipsec-interface-id;mode shared;}}}}# VRF configuration, if not inet.0routing-instances {demo-vrf {instance-type vrf;interface sp-0/0/0.1;interface sp-0/0/0.3;.....}}

The following results are obtained: