Use the following procedure to configure the Auto Tunnel in J-Web.
Before You Begin |
---|
For background information, read
|
To access the Auto Tunnel using J-Web:
Table 170: : Display page for Auto Tunnel – Phase 1
Field |
Function |
---|---|
Gateway |
|
Gateway Name |
Name of the gateway to be searched. |
Search |
Text box for searching a gateway. |
Name |
Name of the destination peer gateway, specified as an alphanumeric string. |
External Interface |
Name of the interface to be used to send traffic to the IPsec VPN. |
Remote Identity |
Provides information about remote peer. |
IKE Policy |
|
Name |
Name of the policy. |
Description |
Description of the policy. |
Mode |
There are two modes:
|
Authentication Method |
Authentication Method configured. |
Proposal |
Name of the proposal configured to be used by this policy in phase 1 |
Proposal |
|
Name |
Name of the proposal selected. |
Authentication Algorithm |
Hash algorithm configured or selected. |
Authentication Method |
Authentication method selected. |
Encryption Algorithm |
Supported Internet Key Exchange (IKE) proposals. |
Table 171: Display page for Auto Tunnel – Phase 2
Field |
Function |
---|---|
VPN name |
Name of the VPN to be searched. |
Search |
Radio button to search a specific VPN listed. |
Name |
Name of the VPN. |
Gateway |
Name of the gateway. |
IPSec Policy |
Associate a policy with this IPsec tunnel. |
Bind Interface |
The tunnel interface to which the route-based VPN is bound. |
Proxy Identity |
The IPsec proxy identity. |
VPN Monitoring |
Name of the VPN monitoring option selected. |
IPSec Policy |
|
Name |
Name of the IPsec policy. |
Description |
Description of the policy. |
Perfect Forward Secrecy |
The method the device uses to generate the encryption key. PFS generates each new encryption key independently from the previous key.
|
Proposal |
Name of the proposal to be used by IPsec policy in Phase 2. |
Proposal |
|
Name |
Description of the Phase 2 proposal. |
Authentication Algorithm |
Hash algorithm that authenticates packet data. It can be one of the following:
|
Protocol |
The type of security protocol. |
Encryption algorithm |
Configures an IKE encryption algorithm.
|
Table 172: Phase 1(VPN Configuration) Add Options
Field |
Function |
Action |
---|---|---|
Gateway>IKE Gateway |
||
Name |
Name of the gateway |
Enter the name of the gateway. |
Policy |
Enter the name of policy you configured for Phase 1. |
|
External Interface |
Name of the interface to be used to send traffic to the IPsec VPN. |
Specify the outgoing interface for IKE SAs. This interface is associated with a zone that acts as its carrier, providing firewall security for it. |
Site to Site Tunnel |
Configuration for VPN is of type site to site. |
Click the radio button labeled Site to Site. |
Address/FQDN |
Address or fully qualified domain name (FQDN) of the peer. |
Provide information about the peer IP or domain name |
Local ID |
||
Identify Type |
There are four identify types:
|
Select one of the identity type options. |
Client Tunnel |
The remote access dynamic VPN. |
|
GatewayI>KE Gateway Options |
||
Local Identity |
The local IKE identity to send in the exchange with the destination peer so that the destination peer can communicate with the local peer. If you do not configure a local identity, the device uses the IP address corresponding to the local endpoint. You can identify the local identity in any of the following ways:
|
Specify an IP address, hostname, user-at-hostname, or distinguished name. |
Dead Peer Detection |
||
Always send |
Instructs the device to send dead peer detection (DPD) requests regardless of whether there is outgoing IPsec traffic to the peer. |
Click the check box. |
Interval |
The amount of time that the peer waits for traffic from its destination peer before sending a DPD request packet. |
Enter the interval at which to send DPD messages. Range: 1 through 60 seconds. |
Threshold |
The maximum number of unsuccessful DPD requests that can be sent before the peer is considered unavailable. |
Enter the maximum number of unsuccessful DPD requests to be sent. Range: 1 through 5. Default: 5. |
XAuth |
Provides extended authentication (XAuth) in addition to IKE authentication for remote users trying to access a VPN tunnel. |
Enter extended authentication (XAuth). |
NAT-Traversal |
Network Address Translation Traversal (NAT-T). NAT-T is enabled by default. |
Click the check box to disable or enable. |
IKE Policy >IKE Policy |
||
Name |
Name of the IKE Policy. |
Enter the policy. |
Description |
Description of the policy. |
Enter the description of the policy. |
Mode |
Select a mode. |
Use Main or Aggressive mode. |
Proposal |
||
Predefined |
Use one of the following types of predefined Phase 1 proposals:
|
Click Predefined and select a proposal type. |
User defined |
Use a user-defined Phase 1 Proposal. |
Click User Defined, select a proposal from the pop-up menu, and click Add. |
Proposal List |
Specfies one or more proposals that can be used during key negotiation:
|
Click the Predefined Proposal radio button to select proposals preconfigured by JUNOS Software. Select User Defined Proposal if you want to use proposals that you have created. |
IKE Policy >IKE Policy Options |
||
Radio Buttons |
Select the preshared key of use of certificate for the VPN. |
If a preshared key is selected, then configure the appropriate key in the form of ASCII text or hexadecimal. |
Local Certificate |
Use a particular certificate when the local device has multiple loaded certificates. |
Enter a local certificate identifier. |
Peer Certificate Type |
Use a preferred type of certificate (PKCS7 or X509). |
Select a certificate type. |
Trusted CA |
||
Name |
Name of the proposal. |
Enter the name of the proposal. |
Authentication Algorithm |
The Authentication Header (AH) algorithm the device uses to verify the authenticity and integrity of a packet. Supported algorithms include the following:
Note: The sha-256 authentication algorithm is not supported with the dynamic VPN feature. |
Select a hash algorithm. |
Authentication Method |
The method the device uses to authenticate the source of Internet Key Exchange (IKE) messages. Options include:
|
Select an authentication method. |
Description |
Easy identification of the proposal. |
Enter a brief description of the IKE proposal. |
DH Group |
The Diffie-Hellman exchange allows participants to produce a shared secret value over an unsecured medium without actually transmitting the value across the connection. |
Select a group. If you configure multiple (up to four) proposals for Phase 1 negotiations, use the same Diffie-Hellman group in all proposals. |
Encryption Algorithm |
Supported Internet Key Exchange (IKE) proposals include the following:
|
Select an encryption algorithm. |
Lifetime seconds |
The lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated. |
Select a lifetime for the IKE SA. Default: 3,600 seconds. Range: 180 through 86,400 seconds. |
Table 173: Phase 2 (IPsec Autokey Configuration) Add Options
Field |
Function |
Action |
---|---|---|
Gateway>IPsec VPN |
||
VPN Name |
Name of the remote gateway. |
Enter a name. |
Remote Gateway |
Associates a policy with this IPsec tunnel. |
Select a name. |
IPsec Policy |
The tunnel interface to which the route-based virtual private network (VPN) is bound. |
Select a policy. |
Bind to tunnel interface |
Specifies when IKE is activated.
|
Select an interface. |
Establish tunnels |
Specifies when IKE is activated.
|
Choose an option. |
Disable anti replay |
Disable the anti-replay checking feature of IPsec. By default, anti-replay checking is enabled. |
Click the check box. |
Gateway > IPsec VPN Options |
||
Enable VPN Monitor |
||
Destination IP |
Associates a policy with this IPsec tunnel. |
Enter an IP address. |
Optimized |
The tunnel interface to which the route-based virtual private network (VPN) is bound. |
Click the check box. |
Source Interface |
Specifies when IKE is activated.
|
Specify a source interface. |
Use Proxy Identity |
||
Remote IP/Netmask |
The remote IP address and subnet mask for proxy identity. |
Enter an IP address and |
Service |
The service (port and protocol combination) to protect. |
Select a service. |
Do not fragment bit |
Specifies how the device handles the Don't Fragment (DF) bit in the outer header.
|
Choose an option. |
Install interval |
The maximum number of seconds to allow installation of a rekeyed outbound security association (SA) on the device. |
Specify a value between 0 and 10 seconds. |
IPsec Policy >IPsec Policy |
||
Name |
Name of the remote gateway. |
Enter a name. |
Description |
Associates a policy with this IPsec tunnel. |
Enter a text description. |
Perfect Forward Secrecy |
The tunnel interface to which the route-based virtual private network (VPN) is bound. |
Select a method. |
Proposal |
Specifies when IKE is activated.
|
|
Predefined |
Disable the anti-replay checking feature of IPsec. By default, anti-replay checking is enabled. |
Click Predefined, and select one of the following options:
|
User defined |
A list of proposals you previously defined. |
Click User Defined , select proposals from the pop-up menu, and then click Add. |
Proposal List |
Available Proposal List are:
|
|
Proposal > IPsec Proposal |
||
Name |
Name of the Phase 2 proposal. |
Enter a name. |
Description |
Description of the Phase 2 proposal. |
Enter a text description. |
Authentication Algorithm |
Hash algorithm that authenticates packet data. It can be one of the following:
|
Select a hash algorithm. |
Encryption Algorithm |
Configures an IKE encryption algorithm.
|
Select an encryption algorithm. |
Lifetime Kilobytes |
The lifetime (in kilobytes) of an IPsec security association (SA). The SA is terminated when the specified number of kilobytes of traffic has passed. |
Enter a value from 64 through 1,048,576 bytes. |
Lifetime Seconds Protocol |
The lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated. |
Enter a value from 180 through 86,400 seconds. |