Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Example: Configure VPN on vSRX Virtual Firewall Between Amazon VPCs

This example shows how to configure IPsec VPN between two instances of vSRX Virtual Firewall on different Amazon VPCs.

Before You Begin

Ensure that you have installed and launched a vSRX Virtual Firewall instance in an Amazon VPCs.

See SRX Site-to-Site VPN Configuration Generator and How to troubleshoot a VPN tunnel that is down or not active for additional information.

Overview

You can use IPsec VPN to secure traffic between two Amazon VPCs using two vSRX Virtual Firewall instances.

vSRX1 VPN Configuration

Procedure

Step-by-Step Procedure

To configure IPsec VPN on vSRX1:

  1. Log in to the vSRX1 console in configuration edit mode (See Configure vSRX Using the CLI.

  2. Set the IP addresses for vSRX1 revenue interfaces.

  3. Set up the untrust security zone.

  4. Set up the trust security zone.

  5. Configure IKE.

  6. Configure IPsec.

  7. Configure routing.

vSRX2 VPN Configuration

Step-by-Step Procedure

To configure IPsec VPN on vSRX2:

  1. Log in to the vSRX2 console in configuration edit mode (See Configure vSRX Using the CLI.

  2. Set the IP addresses for the vSRX2 revenue interfaces.

  3. Set up the untrust security zone.

  4. Set up the trust security zone.

  5. Configure IKE.

  6. Configure IPsec.

  7. Configure routing.

Verification

Verify Active VPN Tunnels

Purpose

Verify that the tunnel is up on both vSRX Virtual Firewall instances on AWS.

Action

Note:

Starting in Junos OS Release 17.4R1, the default user name has changed from root@ to ec2-user@.