[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring Service Sets

To use dynamic SAs on the Services Router, you must create service sets to define the following information for IPsec service:

This configuration allows you to set the remote gateway address and perform IKE validation on all incoming traffic through the IPsec tunnel.

To configure a service set, you must complete the following tasks:

The sample service set configuration in Table 36 configures the IPsec service set ipsec-dynamic and sets the local gateway to 10.90.90.2.

To configure a local gateway for the service set:

  1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.
  2. Perform the configuration tasks described in Table 36.
  3. Go on to one of the following:

Table 36: Configuring a Local Gateway

Task

J-Web Configuration Editor

CLI Configuration Editor

Navigate to the Services level in the configuration hierarchy.

  1. In the J-Web interface, select Configuration>View and Edit>Edit Configuration.
  2. Next to Services, click Configure or Edit.

From the [edit] hierarchy level, enter

edit services

Configure the service set ipsec-dynamic.

  1. Next to Service set, click Add new entry.
  2. In the Service set name box, type ipsec-dynamic.
  3. Click OK.

Enter

set service-set ipsec-dynamic

Configure the IP address of the local gateway for the IPsec service set to the local tunnel endpoint—for example, 10.1.15.1.

  1. In the Service set list, click ipsec-dynamic.
  2. Next to Ipsec vpn options, click Configure.
  3. In the Local gateway box, type 10.1.15.1.
  4. Click OK until you return to the Services page.

Enter

set service-set ipsec-dynamic ipsec-vpn-options local-gateway 10.1.15.1

The sample next-hop configuration in Table 37 adds the next-hop services interfaces to the IPsec service set ipsec-dynamic created in Table 36. This sample next-hop configuration sets the inside services interface to sp-0/0/0.1001, and sets the outside services interface (facing the remote IPsec site) to sp-0/0/0.2001.

To configure next-hop services interfaces:

  1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.
  2. Perform the configuration tasks described in Table 37.
  3. Go on to Applying IPsec Rules to Service Sets.

Table 37: Configuring Next-Hop Services Interfaces

Task

J-Web Configuration Editor

CLI Configuration Editor

Navigate to the Services level in the configuration hierarchy.

  1. In the J-Web interface, select Configuration>View and Edit>Edit Configuration.
  2. Next to Services, click Configure or Edit.

From the [edit] hierarchy level, enter

edit services

Configure the next-hop service set for the IPsec tunnel.

You must include an interface name and unit number for the inside-service interface and the outside-service interface. By default, the J-Web interface uses the following values:

  • For the inside-service interface—sp-0/0/0.1001
  • For the outside-service interface—sp-0/0/0.2001
  1. In the Service set list, click ipsec-dynamic.
  2. In the Service type choice box, select Next hop service from the list.
  3. Next to Next hop service, click Configure.
  4. In the Inside service interface box, type sp-0/0/0.1001.
  5. In the Outside service interface box, type sp–0/0/0.2001.
  6. Click OK until you return to the Services page.
  1. Enter

    set service-set ipsec-dynamic next-hop-service inside-service-interface sp-0/0/0.1001

  2. Enter

    set service-set ipsec-dynamic next-hop-service outside-service-interface sp-0/0/0.2001

The sample interface service set configuration in Table 38 adds the interface service-set configuration to the IPsec service set ipsec-dynamic created in Table 36. This sample interface service-set configuration sets the services interface sp-0/0/0.

To configure interface service sets:

  1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.
  2. Perform the configuration tasks described in Table 38.
  3. Go on to Applying IPsec Rules to Service Sets.

Table 38: Configuring Interface Service Sets

Task

J-Web Configuration Editor

CLI Configuration Editor

Navigate to the Services level in the configuration hierarchy.

  1. In the J-Web interface, select Configuration>View and Edit>Edit Configuration.
  2. Next to Services, click Configure or Edit.

From the [edit] hierarchy level, enter

edit services

Configure the interface service set and specify sp-0/0/0 as the services interface to be used for IPsec traffic.

  1. In the Service set list, click ipsec-dynamic.
  2. In the Service type choice box, select Interface service from the list.
  3. Next to Interface service, click Configure.
  4. In the Service interface box, type sp-0/0/0.
  5. Click OK until you return to the Services page.

Enter

set service-set ipsec-dynamic interface-service service-interface sp-0/0/0

The sample configuration in Table 39 configures the service set ipsec-dynamic configured in Table 36 to use the IPsec rule ipsec-dynamic-rule defined in Table 34.

To apply an IPsec rule to a service set:

  1. Navigate to the top of the configuration hierarchy in either the J-Web or CLI configuration editor.
  2. Perform the configuration tasks described in Table 39.
  3. If you are finished configuring the router, commit the configuration.
  4. Go on to the optional task Configuring a NAT Pool.
  5. To check the configuration, see Verifying the IPsec Tunnel Configuration.

Table 39: Applying IPsec Rules to Service Sets

Task

J-Web Configuration Editor

CLI Configuration Editor

Navigate to the Services level in the configuration hierarchy.

  1. In the J-Web interface, select Configuration>View and Edit>Edit Configuration.
  2. Next to Services, click Configure or Edit.

From the [edit] hierarchy level, enter

edit services

Apply the IPsec rule ipsec-dynamic-rule to all traffic through the service set.

  1. In the Service set list, click ipsec-dynamic.
  2. In the Ipsec vpn rules choice box, select Ipsec vpn rules.
  3. Next to Ipsec vpn rules, click Add new entry.
  4. In the Rule name box, type ipsec-dynamic-rule.
  5. Click OK.

Enter

set service-set ipsec-dynamic ipsec-vpn-rules ipsec-dynamic-rule


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]