|
Configure the next-hop service set for the IPSec tunnel.
Use any unique string for the service set name.
You must include an interface name and unit number for the inside-service
interface and the outside-service interface. By default, J-Web Quick Configuration
uses the following values:
- For the inside-service interface—sp-0/0/0.1001
- For the outside-service interface—sp-0/0/0.2002
|
- From the top of the configuration hierarchy, click Services.
- Next to Service sets, click Add new entry.
- In the Service set name box, type the name of the service
set.
- In the Service type choice box, select Next
hop service from the list.
- In the Nested configuration box, click Next
hop service.
- In the Inside service interface box, type sp-0/0/0.1001.
- Click OK.
- In the Nested configuration box, click Next
hop service.
- In the Outside service interface box, type sp–0/0/0.2002.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services
- Set the inside-service interface:
set service-set service-set-name next-hop-service
inside-service-interface sp-0/0/0.1001
- Set the outside-service interface:
set service-set service-set-name next-hop-service
outside-service-interface sp-0/0/0.2002
|
|
Configure the IP address of the local gateway for the IPSec service
set to the local tunnel endpoint—for example, 1.1.1.1.
|
- Next to Ipsec vpn options, click Configure.
- In the Local gateway box, type 1.1.1.1.
|
Set the local gateway address for the service set:
set service-set service-set-name ipsec-vpn-options
local-gateway 1.1.1.1
|
|
Configure IPSec rules to set the IP address of the remote gateway—for
example, 2.2.2.2—on all traffic.
Use any unique string for the rule name.
Because the rule applies to all traffic, you must only configure the
action (or then statement) for the term. Use any unique string for
the term name.
|
- From the top of the configuration hierarchy, click Services>Ipsec-vpn.
- Next to Rule, click Add new entry.
- In the Rule name box, type the name of the rule.
- Next to the term, click Add new entry.
- In the Term name box, type the name of the term.
- To configure an action, click Then.
- In the Remote gateway box, type 2.2.2.2.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn
- Configure a rule with a term that sets the remote gateway
to 2.2.2.2:
set rule rule-name term term-name then
remote-gateway 2.2.2.2
|
|
Configure a security association with a static IKE key.
The IKE key is a preshared key and must be configured exactly the same
way at both the local and remote endpoints of the IPSec tunnel.
The IKE key is configured as ike policy and then applied with
the dynamic statement. Use any unique string for the IKE policy name.
|
- From the top of the configuration hierarchy, select Services>Ipsec-vpn>Ike.
- Next to Policy, click Add new entry.
- In the Name box, type the name of the IKE policy.
- Click Pre-shared key.
- In the Key choice box, select Ascii text from
the list.
- In the Ascii text box, type the IKE key in plain text.
- Click OK.
- Navigate to the IPSec rule configured previously. From
the top of the configuration hierarchy, click Services>Ipsec-vp>rule-name >term term-name>then.
- Click Dynamic.
- In the Ike-policy box, type the name of the IKE policy
you configured.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn ike
- Configure the IKE pre-shared key in ASCII text format:
set policy policy-name pre-shared-key ascii-text ike-key
- Navigate to the IPSec rule configured previously. From
the top of the configuration hierarchy, enter
edit services ipsec-vpn rule-name term term-name then.
- Configure a dynamic security association that applies the
IKE policy:
set dynamic ike-policy policy-name
|
|
Configure the IPSec rule so that it acts on input traffic.
|
- From the top of the configuration hierarchy, click Services>Ipsec-vpn>Rule> rule-name.
- In the Match direction box, select Input from
the list.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services ipsec-vpn rule rule-name
- Set the match direction for the rule:
set match-direction input
|
|
Apply the IPSec rule to all traffic through the previously configured
service set.
|
- From the top of the configuration hierarchy, click Services>Service-set> service-set-name.
- In the Ipsec vpn rules choice box, select Ipsec
vpn rules from the list.
- Next to Ipsec vpn rules, click Add new
entry.
- In the Rule name box, type the name of the previously configured
IPSec rule.
- Click OK.
|
- From the top of the configuration hierarchy, enter
edit services service-set service-set-name
- Apply the IPSec rule previously configured:
set ipsec-vpn-rules rule-name
|