SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
© 2016
VNS3 to Junpier
Instructions
SSG IPsec Configuration Guide
2016
© 2016
Site-to-Site IPsec Tunnel
2
IPsec protocol allows you to securely connect two sites together over the
public internet using cryptographically secured services. IPsec ensure private
and secure communication between two devices. This type of VPN has many
use-cases. We will focus on the Site-to-Site or LAN-to-LAN setup most often
used with VNS3 to build Hybrid Clouds.
• Many network hardware devices support IPsec tunneling functionality.
Check your device's data sheet to see if it is compatible with VNS3. The
requirements are:
• IKE1 or IKE2
• AES256 or AES128 or 3DES
• SHA1 or MD5
• NAT-Traversal capability (some clouds require NAT-Traversal encapsulation -
AWS Generic EC2, Microsoft Azure, etc.)
A diagram of the typical secure hybrid cloud setup using VNS3 is provided on
the right. The IPsec tunnel provides secure and encrypted connectivity
between the office subnet (192.169.3.0/24) and the VNS3 Overlay Network
(172.31.1.0/24).
This guide will provide steps to setup the Juniper SSG side of the IPsec
configuration.
The most important thing in any IPsec configuration is to make sure all
settings match on both devices that are going to connect to each other.
Mismatches are the primary cause for tunnel failure or instability.
Public Cloud
Overlay Network
Subnet: 172.31.1.0/24
Cloud Server
Overlay IP: 172.31.1.1
Server B
LAN IP: 192.168.3.100
Server A
LAN IP: 192.168.3.50
Customer Remote Office
Remote subnet: 192.168.3.0/24
VNS3
public IP: 184.73.174.250
overlay IP: 172.31.1.250
Firewall / IPsec
Juniper SSG
Active IPsec tunnel
192.168.3.0/24 - 172.31.1.0/24
© 2016
Create Tunnel Interface
3
The first step in setting up an IPsec tunnel is to create a
tunnel interface the Juniper will use for the connection, if
one is not already created and ready for use.
Click Network>Interface>List from the right column menu.
Click New in the top right of the resulting Interfaces List
page next to the drop down menu with Tunnel IF selected.
Enter a tunnel integer in the Tunnel Interface Name field.
In this example we use 1 as no other tunnel interfaces are
configured.
Select Trust from the Zone (VR) drop down menu.
Select the Unnumbered radio button and select the
outside or public interface from the drop down list. In our
example we use ethernet0/0 (trust-vr) as that is the port
that is being used to access the public Internet through out
Network Lab edge.
Click OK.
© 2016
Create Phase 1 Proposal Object
4
It is recommended best practices to create a specific Phase 1
proposal definition for the VNS3 configuration and specify only that
proposal in the Gateway setup. This prevents the tunnel from being
negotiated with other parameters.
Click VPNs>AutoKey Advanced>P1 Proposal.
Click New.
Enter a Name in the Name field. In this example we use VNS3 P1.
Select Preshare from the Authentication Method drop down.
Select Group 5 from the DH Group drop down.
Select AES-CBC(256 Bits) from the Encryption Algorithm drop down.
Select SHA-1 from the Hash Algorithm drop down.
Enter 3600 in the Lifetime field and click the Sec radio button.
Click OK.
NOTE: these are the default and recommended VNS3 settings for
Phase 1. You can use whatever settings you choose, just remember
they need to match exactly with the VNS3 side of the configuration.
© 2016
Create Phase 2 Proposal Object
5
It is recommended best practices to create a specific Phase 2
proposal definition for the VNS3 configuration and specify only that
proposal in the Auto IKE setup. This prevents the tunnel from being
negotiated with other parameters.
Click VPNs>AutoKey Advanced>P2 Proposal.
Click New.
Enter a Name in the Name field. In this example we use VNS3 P1.
Select DH Group 5 from the Perfect Forward Secrecy drop down.
Select AES-CBC(256 Bits) from the Encryption Algorithm drop down.
Select SHA-1 from the Hash Algorithm drop down.
Enter 2800 in the Lifetime field and click the Sec radio button.
Click OK.
NOTE: these are the default and recommended VNS3 settings for
Phase 2. You can use whatever settings you choose, just remember
they need to match exactly with the VNS3 side of the configuration.
© 2016
Create Gateway (Phase 1)
6
Create a Gateway configuration for the VNS3 Controller on the
Juniper to provide details about IPsec Phase 1 negotiation.
Click VPNs>AutoKey Advanced>Gateway.
Enter a Name for the Gateway.
Select Remote Gateway and Static IP Address.
Enter the Public IP of the VNS3 Controller in the IP Address/
Hostname field.
*If using NAT-Traversal Encapsulation you will need to enter the VNS3
Local Private IP (default 192.0.2.254) in the Peer ID field.
Click Advanced.
Enter a PSK in the Preshared Key field. In our example we use test.
If the Juniper is not in the network edge, enter it's NAT'd IP in the
Local ID field.
Click on the Custom User Defined radio button under Security Level
then select the custom VNS3 Phase 1 proposal created earlier.
Click Enable NAT-Traversal if using NAT-Traversal Encapsulation.
Click Return then OK.
© 2016
Add VPN: Proposals
7
Now that the remote Gateway (VNS3) is defined and Phase 1
settings are configured, Phase 2 parameters can be entered.
Click VPNs>AutoKey IKE
Enter a Name for the AutoKey IKE Object in the VPN Name
field.
Click the Remote Gateway radio button.
Click Predefined and select the Gateway that was just
created.
Click Advanced.
Click on the Custom User Defined radio button under
Security Level then select the custom VNS3 Phase 2 proposal
created earlier.
Click Tunnel Interface then select the tunnel.1 interface
previously created under Bind to.
Click Return then OK.
© 2016
Add Policies
8
Now that the Gateway, Phase1 and Phase2 definitions have been added
to the Juniper, the next step is to setup the appropriate policies to allow
traffic from the Local and Remote subnets to pass.
Two rules are required for each tunnel.
1.Rule from Trust Zone to Untrust Zone - this rule allows traffic from
the local subnet (Juniper subnet - in our example 192.168.5.0/24) to
the remote subnet (VNS3 Overlay subnet - in our example
172.31.1.0/24).
2.Rule from Untrust Zone to Trust Zone - this rule allows traffic from
remote subnet (VNS3 Overlay subnet - in our example 172.31.1.0/24)
to the local subnet (Juniper subnet - in our example 192.168.5.0/24).
For Rule #1 Above select Trust on the From drop down and Untrust on
the To drop down, then click New.
Enter the Source (192.168.5.0/24) and Destination Addresses
(172.31.1.0/24) select ANY in the Service drop down and click OK.
For Rule #1 Above select Untrust on the From drop down and Trust on
the To drop down, then click New.
Enter the Source (172.31.1.0/24) and Destination Addresses
(192.168.5.0/24) select ANY in the Service drop down and click OK.
© 2016
IPsec Review
9
Finally we need to add the appropriate route
to allow traffic to flow from the Juniper subnet
through the appropriate tunnel interface to
the VNS3 remote Overlay subent.
Click Routing>Destination.
Enter the VNS3 remote Overlay subnet
(172.31.1.0/24 in our example) in the IP
Address/Netmask field.
Click the Gateway radio button and select
tunnel.1 from the Interface drop down.
Click OK.
© 2016
Troubleshooting
10
© 2016
Tunnel Traffic
11
Depending on your network architecture, tunnel traffic may need to be passed from the
Sonicwall side of the connection to start the initial IPsec negotiation. Ping the VNS3
Controller instance's Overlay IP address (listed on the Runtime Status page) from a device
on the Sonicwall local subnet.
© 2016
Peer ID
12
If VNS3 has NAT-Traversal enabled (VNS3
default setting), you will need to enter in the
Peer ID in the Gateway definition. Without this
entered, there will be INVALID_ID errors in the
VNS3 IPsec logs and the tunnel will not
negotiate.
If VNS3 has NAT-Traversal disabled, you will
not need to enter the Peer ID>
© 2016
VPN Monitor
13
Juniper recommends enabling VPN Monitor in
all Policy-based VPN setup guides. VPN
Monitor is not supported in connections to
VNS3 Managers. It prevents traffic from
traversing the tunnel.
Make sure VPN Monitor is disabled on the
VPNs>AutoKey IKE>Advanced page.
© 2016
VNS3 Document Links
14
VNS3 Product Resources - Documentation | Add-ons
VNS3 Configuration Document

Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology.
Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building
IPsec tunnels, and connecting client servers to the Overlay Network. 

VNS3 Docker Instructions

Explains the value of the VNS3 3.5 Docker integration and covers uploading, allocating and exporting
application containers.
VNS3 Troubleshooting

Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3.


Weitere ähnliche Inhalte

Was ist angesagt?

PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PROIDEA
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortIPMAX s.r.l.
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccnarobertoxe
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summarymoonmanik
 
Ios zone based-firewall
Ios zone based-firewallIos zone based-firewall
Ios zone based-firewallMohamed Gamel
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosOleh Stupak
 
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC
 
ZodiacWX_Northbound Networks manual1
ZodiacWX_Northbound Networks manual1ZodiacWX_Northbound Networks manual1
ZodiacWX_Northbound Networks manual1Nam Yong Kim
 
Switching and Port Security
  Switching and Port Security  Switching and Port Security
Switching and Port Securityusman19
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its TypesNetwax Lab
 
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...Salem Trabelsi
 
Configuration steps for the cisco 300 series switches v3
Configuration steps for the cisco 300 series switches v3Configuration steps for the cisco 300 series switches v3
Configuration steps for the cisco 300 series switches v3Conrad Cruz
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessHarris Andrea
 
Practical Verification of TKIP Vulnerabilities
Practical Verification of TKIP VulnerabilitiesPractical Verification of TKIP Vulnerabilities
Practical Verification of TKIP Vulnerabilitiesvanhoefm
 
Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUICNatasha Rooney
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]Summit Bisht
 

Was ist angesagt? (20)

PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security PLNOG 9: Piotr Wojciechowski - Multicast Security
PLNOG 9: Piotr Wojciechowski - Multicast Security
 
Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Router security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summaryRouter security-configuration-guide-executive-summary
Router security-configuration-guide-executive-summary
 
Ios zone based-firewall
Ios zone based-firewallIos zone based-firewall
Ios zone based-firewall
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control NetworksBSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
BSidesROC 2016 - Nick Piazza - Fault Tolerant Command and Control Networks
 
ZodiacWX_Northbound Networks manual1
ZodiacWX_Northbound Networks manual1ZodiacWX_Northbound Networks manual1
ZodiacWX_Northbound Networks manual1
 
Firewalls
FirewallsFirewalls
Firewalls
 
Switching and Port Security
  Switching and Port Security  Switching and Port Security
Switching and Port Security
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...4.4.1.3 packet tracer   configuring a zone-based policy firewall (zpf) instru...
4.4.1.3 packet tracer configuring a zone-based policy firewall (zpf) instru...
 
Configuration steps for the cisco 300 series switches v3
Configuration steps for the cisco 300 series switches v3Configuration steps for the cisco 300 series switches v3
Configuration steps for the cisco 300 series switches v3
 
Basic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet AccessBasic Cisco 800 Router Configuration for Internet Access
Basic Cisco 800 Router Configuration for Internet Access
 
Practical Verification of TKIP Vulnerabilities
Practical Verification of TKIP VulnerabilitiesPractical Verification of TKIP Vulnerabilities
Practical Verification of TKIP Vulnerabilities
 
Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUIC
 
Access control list [1]
Access control list [1]Access control list [1]
Access control list [1]
 

Andere mochten auch

Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks
 
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization?
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization? Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization?
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization? Ender Uslu
 
Rechnen mit prozenten
Rechnen mit prozentenRechnen mit prozenten
Rechnen mit prozentenDavid Schmidl
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks
 
API Days - API Security & the Audit Paradox by Chris Swan
API Days - API Security & the Audit Paradox by Chris SwanAPI Days - API Security & the Audit Paradox by Chris Swan
API Days - API Security & the Audit Paradox by Chris SwanCohesive Networks
 
RWE Innogy discusses reasons for corrosion protection failure and best possib...
RWE Innogy discusses reasons for corrosion protection failure and best possib...RWE Innogy discusses reasons for corrosion protection failure and best possib...
RWE Innogy discusses reasons for corrosion protection failure and best possib...Automotive IQ
 
Export barriers and enablers faced by Indian Leather Handicraft Sector
Export barriers and enablers faced by Indian Leather Handicraft SectorExport barriers and enablers faced by Indian Leather Handicraft Sector
Export barriers and enablers faced by Indian Leather Handicraft SectorPooja Das
 
Magazine name analysis
Magazine name analysisMagazine name analysis
Magazine name analysischarlie_99Xx
 

Andere mochten auch (9)

Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Warner brothers
Warner brothers Warner brothers
Warner brothers
 
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization?
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization? Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization?
Bir Spor organizasyonu nasıl pazarlanır/How to market a sports organization?
 
Rechnen mit prozenten
Rechnen mit prozentenRechnen mit prozenten
Rechnen mit prozenten
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
API Days - API Security & the Audit Paradox by Chris Swan
API Days - API Security & the Audit Paradox by Chris SwanAPI Days - API Security & the Audit Paradox by Chris Swan
API Days - API Security & the Audit Paradox by Chris Swan
 
RWE Innogy discusses reasons for corrosion protection failure and best possib...
RWE Innogy discusses reasons for corrosion protection failure and best possib...RWE Innogy discusses reasons for corrosion protection failure and best possib...
RWE Innogy discusses reasons for corrosion protection failure and best possib...
 
Export barriers and enablers faced by Indian Leather Handicraft Sector
Export barriers and enablers faced by Indian Leather Handicraft SectorExport barriers and enablers faced by Indian Leather Handicraft Sector
Export barriers and enablers faced by Indian Leather Handicraft Sector
 
Magazine name analysis
Magazine name analysisMagazine name analysis
Magazine name analysis
 

Ähnlich wie Cohesive Networks Support Docs: VNS3 Setup for Juniper

Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks
 
The endian vpn menu
The endian vpn menuThe endian vpn menu
The endian vpn menujanil_kumar
 
AWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab SheetAWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab SheetKimberly Macias
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliationGurjan Oberoi
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.Kapil Sabharwal
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Dân Chơi
 
Configuring Wds
Configuring WdsConfiguring Wds
Configuring Wds925351jay1
 

Ähnlich wie Cohesive Networks Support Docs: VNS3 Setup for Juniper (20)

Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Vpn
VpnVpn
Vpn
 
The endian vpn menu
The endian vpn menuThe endian vpn menu
The endian vpn menu
 
AWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab SheetAWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab Sheet
 
Final report firewall reconciliation
Final report   firewall reconciliationFinal report   firewall reconciliation
Final report firewall reconciliation
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011Ccna 4 chapter 6 v4.0 answers 2011
Ccna 4 chapter 6 v4.0 answers 2011
 
Firewall
FirewallFirewall
Firewall
 
Configuring Wds
Configuring WdsConfiguring Wds
Configuring Wds
 
H323 support.docx
H323 support.docxH323 support.docx
H323 support.docx
 

Mehr von Cohesive Networks

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...Cohesive Networks
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Cohesive Networks
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Cohesive Networks
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Cohesive Networks
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanCohesive Networks
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive Networks
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks
 
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container GuideCohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container GuideCohesive Networks
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks
 
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive Networks
 
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Cohesive Networks
 

Mehr von Cohesive Networks (16)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
 
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container GuideCohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
 
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF Guide
 
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Cohesive Networks Support Docs: VNS3 Setup for Juniper

  • 1. © 2016 VNS3 to Junpier Instructions SSG IPsec Configuration Guide 2016
  • 2. © 2016 Site-to-Site IPsec Tunnel 2 IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically secured services. IPsec ensure private and secure communication between two devices. This type of VPN has many use-cases. We will focus on the Site-to-Site or LAN-to-LAN setup most often used with VNS3 to build Hybrid Clouds. • Many network hardware devices support IPsec tunneling functionality. Check your device's data sheet to see if it is compatible with VNS3. The requirements are: • IKE1 or IKE2 • AES256 or AES128 or 3DES • SHA1 or MD5 • NAT-Traversal capability (some clouds require NAT-Traversal encapsulation - AWS Generic EC2, Microsoft Azure, etc.) A diagram of the typical secure hybrid cloud setup using VNS3 is provided on the right. The IPsec tunnel provides secure and encrypted connectivity between the office subnet (192.169.3.0/24) and the VNS3 Overlay Network (172.31.1.0/24). This guide will provide steps to setup the Juniper SSG side of the IPsec configuration. The most important thing in any IPsec configuration is to make sure all settings match on both devices that are going to connect to each other. Mismatches are the primary cause for tunnel failure or instability. Public Cloud Overlay Network Subnet: 172.31.1.0/24 Cloud Server Overlay IP: 172.31.1.1 Server B LAN IP: 192.168.3.100 Server A LAN IP: 192.168.3.50 Customer Remote Office Remote subnet: 192.168.3.0/24 VNS3 public IP: 184.73.174.250 overlay IP: 172.31.1.250 Firewall / IPsec Juniper SSG Active IPsec tunnel 192.168.3.0/24 - 172.31.1.0/24
  • 3. © 2016 Create Tunnel Interface 3 The first step in setting up an IPsec tunnel is to create a tunnel interface the Juniper will use for the connection, if one is not already created and ready for use. Click Network>Interface>List from the right column menu. Click New in the top right of the resulting Interfaces List page next to the drop down menu with Tunnel IF selected. Enter a tunnel integer in the Tunnel Interface Name field. In this example we use 1 as no other tunnel interfaces are configured. Select Trust from the Zone (VR) drop down menu. Select the Unnumbered radio button and select the outside or public interface from the drop down list. In our example we use ethernet0/0 (trust-vr) as that is the port that is being used to access the public Internet through out Network Lab edge. Click OK.
  • 4. © 2016 Create Phase 1 Proposal Object 4 It is recommended best practices to create a specific Phase 1 proposal definition for the VNS3 configuration and specify only that proposal in the Gateway setup. This prevents the tunnel from being negotiated with other parameters. Click VPNs>AutoKey Advanced>P1 Proposal. Click New. Enter a Name in the Name field. In this example we use VNS3 P1. Select Preshare from the Authentication Method drop down. Select Group 5 from the DH Group drop down. Select AES-CBC(256 Bits) from the Encryption Algorithm drop down. Select SHA-1 from the Hash Algorithm drop down. Enter 3600 in the Lifetime field and click the Sec radio button. Click OK. NOTE: these are the default and recommended VNS3 settings for Phase 1. You can use whatever settings you choose, just remember they need to match exactly with the VNS3 side of the configuration.
  • 5. © 2016 Create Phase 2 Proposal Object 5 It is recommended best practices to create a specific Phase 2 proposal definition for the VNS3 configuration and specify only that proposal in the Auto IKE setup. This prevents the tunnel from being negotiated with other parameters. Click VPNs>AutoKey Advanced>P2 Proposal. Click New. Enter a Name in the Name field. In this example we use VNS3 P1. Select DH Group 5 from the Perfect Forward Secrecy drop down. Select AES-CBC(256 Bits) from the Encryption Algorithm drop down. Select SHA-1 from the Hash Algorithm drop down. Enter 2800 in the Lifetime field and click the Sec radio button. Click OK. NOTE: these are the default and recommended VNS3 settings for Phase 2. You can use whatever settings you choose, just remember they need to match exactly with the VNS3 side of the configuration.
  • 6. © 2016 Create Gateway (Phase 1) 6 Create a Gateway configuration for the VNS3 Controller on the Juniper to provide details about IPsec Phase 1 negotiation. Click VPNs>AutoKey Advanced>Gateway. Enter a Name for the Gateway. Select Remote Gateway and Static IP Address. Enter the Public IP of the VNS3 Controller in the IP Address/ Hostname field. *If using NAT-Traversal Encapsulation you will need to enter the VNS3 Local Private IP (default 192.0.2.254) in the Peer ID field. Click Advanced. Enter a PSK in the Preshared Key field. In our example we use test. If the Juniper is not in the network edge, enter it's NAT'd IP in the Local ID field. Click on the Custom User Defined radio button under Security Level then select the custom VNS3 Phase 1 proposal created earlier. Click Enable NAT-Traversal if using NAT-Traversal Encapsulation. Click Return then OK.
  • 7. © 2016 Add VPN: Proposals 7 Now that the remote Gateway (VNS3) is defined and Phase 1 settings are configured, Phase 2 parameters can be entered. Click VPNs>AutoKey IKE Enter a Name for the AutoKey IKE Object in the VPN Name field. Click the Remote Gateway radio button. Click Predefined and select the Gateway that was just created. Click Advanced. Click on the Custom User Defined radio button under Security Level then select the custom VNS3 Phase 2 proposal created earlier. Click Tunnel Interface then select the tunnel.1 interface previously created under Bind to. Click Return then OK.
  • 8. © 2016 Add Policies 8 Now that the Gateway, Phase1 and Phase2 definitions have been added to the Juniper, the next step is to setup the appropriate policies to allow traffic from the Local and Remote subnets to pass. Two rules are required for each tunnel. 1.Rule from Trust Zone to Untrust Zone - this rule allows traffic from the local subnet (Juniper subnet - in our example 192.168.5.0/24) to the remote subnet (VNS3 Overlay subnet - in our example 172.31.1.0/24). 2.Rule from Untrust Zone to Trust Zone - this rule allows traffic from remote subnet (VNS3 Overlay subnet - in our example 172.31.1.0/24) to the local subnet (Juniper subnet - in our example 192.168.5.0/24). For Rule #1 Above select Trust on the From drop down and Untrust on the To drop down, then click New. Enter the Source (192.168.5.0/24) and Destination Addresses (172.31.1.0/24) select ANY in the Service drop down and click OK. For Rule #1 Above select Untrust on the From drop down and Trust on the To drop down, then click New. Enter the Source (172.31.1.0/24) and Destination Addresses (192.168.5.0/24) select ANY in the Service drop down and click OK.
  • 9. © 2016 IPsec Review 9 Finally we need to add the appropriate route to allow traffic to flow from the Juniper subnet through the appropriate tunnel interface to the VNS3 remote Overlay subent. Click Routing>Destination. Enter the VNS3 remote Overlay subnet (172.31.1.0/24 in our example) in the IP Address/Netmask field. Click the Gateway radio button and select tunnel.1 from the Interface drop down. Click OK.
  • 11. © 2016 Tunnel Traffic 11 Depending on your network architecture, tunnel traffic may need to be passed from the Sonicwall side of the connection to start the initial IPsec negotiation. Ping the VNS3 Controller instance's Overlay IP address (listed on the Runtime Status page) from a device on the Sonicwall local subnet.
  • 12. © 2016 Peer ID 12 If VNS3 has NAT-Traversal enabled (VNS3 default setting), you will need to enter in the Peer ID in the Gateway definition. Without this entered, there will be INVALID_ID errors in the VNS3 IPsec logs and the tunnel will not negotiate. If VNS3 has NAT-Traversal disabled, you will not need to enter the Peer ID>
  • 13. © 2016 VPN Monitor 13 Juniper recommends enabling VPN Monitor in all Policy-based VPN setup guides. VPN Monitor is not supported in connections to VNS3 Managers. It prevents traffic from traversing the tunnel. Make sure VPN Monitor is disabled on the VPNs>AutoKey IKE>Advanced page.
  • 14. © 2016 VNS3 Document Links 14 VNS3 Product Resources - Documentation | Add-ons VNS3 Configuration Document
 Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. 
 VNS3 Docker Instructions
 Explains the value of the VNS3 3.5 Docker integration and covers uploading, allocating and exporting application containers. VNS3 Troubleshooting
 Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3.