Juniper SRX动态VPN配置

  配置脚本

  root@ITAA# show | no-more

  ## Last changed: 2002-01-09 05:10:52 UTC

  version 12.1X46-D10.2;

  system {

  host-name ITAA;

  root-authentication {

  encrypted-password "$1$G5/tL57r$/.BmhuyouGi7l2DlQv.8X0"; ## SECRET-DATA

  }

  name-server {

  208.67.222.222;

  208.67.220.220;

  }

  services {

  ssh;

  telnet;

  xnm-clear-text;

  web-management {

  http {

  interface vlan.0;

  }

  https {

  system-generated-certificate;

  interface vlan.0;

  }

  }

  dhcp {

  router {

  192.168.1.1;

  }

  pool 192.168.1.0/24 {

  address-range low 192.168.1.2 high 192.168.1.254;

  }

  propagate-settings fe-0/0/0.0;

  }

  }

  syslog {

  archive size 100k files 3;

  user * {

  any emergency;

  }

  file messages {

  any critical;

  authorization info;

  }

  file interactive-commands {

  interactive-commands error;

  }

  }

  max-configurations-on-flash 5;

  max-configuration-rollbacks 5;

  license {

  autoupdate {

  url https://ae1.juniper.net/junos/key_retrieval;

  }

  }

  }

  interfaces {

  fe-0/0/0 {

  unit 0 {

  family inet {

  address 100.1.1.1/24;

  }

  }

  }

  fe-0/0/1 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/2 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/3 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/4 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/5 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/6 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  fe-0/0/7 {

  unit 0 {

  family ethernet-switching {

  vlan {

  members vlan-trust;

  }

  }

  }

  }

  vlan {

  unit 0 {

  family inet {

  address 192.168.1.1/24;

  }

  }

  }

  }

  routing-options {

  static {

  route 0.0.0.0/0 next-hop 100.1.1.254;

  }

  }

  protocols {

  stp;

  }

  security {

  ike {

  policy client-vpn-ike-pol {

  mode aggressive;

  proposal-set standard;

  pre-shared-key ascii-text "$9$LWxx-w4aUji.vW"; ## SECRET-DATA

  }

  gateway client-vpn-gw {

  ike-policy client-vpn-ike-pol;

  dynamic {

  hostname itaadynvpn;

  connections-limit 2;

  ike-user-type group-ike-id;

  }

  external-interface fe-0/0/0.0;

  xauth access-profile client-vpn-access-profile;

  }

  }

  ipsec {

  policy client-vpn-ipsec-pol {

  proposal-set standard;

  }

  vpn client-vpn {

  ike {

  gateway client-vpn-gw;

  ipsec-policy client-vpn-ipsec-pol;

  }

  }

  }

  dynamic-vpn {

  access-profile client-vpn-access-profile;

  clients {

  all {

  remote-protected-resources {

  192.168.1.0/24;

  }

  remote-exceptions {

  0.0.0.0/0;

  }

  ipsec-vpn client-vpn;

  user {

  itaa;

  }

  }

  }

  }

  nat {

  source {

  rule-set trust-to-untrust {

  from zone trust;

  to zone untrust;

  rule source-nat-rule {

  match {

  source-address 0.0.0.0/0;

  }

  then {

  source-nat {

  interface;

  }

  }

  }

  }

  }

  proxy-arp {

  interface vlan.0 {

  address {

  192.168.1.192/30;

  }

  }

  }

  }

  policies {

  from-zone trust to-zone untrust {

  policy trust-to-untrust {

  match {

  source-address any;

  destination-address any;

  application any;

  }

  then {

  permit;

  }

  }

  }

  from-zone untrust to-zone trust {

  policy client-vpn-access {

  match {

  source-address any;

  destination-address any;

  application any;

  }

  then {

  permit {

  tunnel {

  ipsec-vpn client-vpn;

  }

  }

  }

  }

  }

  }

  zones {

  security-zone trust {

  host-inbound-traffic {

  system-services {

  all;

  }

  protocols {

  all;

  }

  }

  interfaces {

  vlan.0;

  }

  }

  security-zone untrust {

  interfaces {

  fe-0/0/0.0 {

  host-inbound-traffic {

  system-services {

  ike;

  https;

  ping;

  }

  }

  }

  }

  }

  }

  }

  access {

  profile client-vpn-access-profile {

  client itaa {

  firewall-user {

  password "$9$Y3gaUk.5Qz6Vw.PTQn6lKv"; ## SECRET-DATA

  }

  }

  address-assignment {

  pool client-vpn-pool;

  }

  }

  address-assignment {

  pool client-vpn-pool {

  family inet {

  network 192.168.1.192/30;

  xauth-attributes {

  primary-dns 8.8.8.8/32;

  }

  }

  }

  }

  firewall-authentication {

  web-authentication {

  default-profile client-vpn-access-profile;

  }

  }

  }

  vlans {

  vlan-trust {

  vlan-id 3;

  l3-interface vlan.0;

  }

  }

  [edit]

  root@ITAA# run show security dynamic-vpn client version

  Junos Pulse 4.0.2.34169

  [edit]

  root@ITAA# run show system license usage

  Licenses     Licenses    Licenses    Expiry

  Feature name                       used    installed      needed

  dynamic-vpn                           1            2           0    permanent

  ax411-wlan-ap                         0            2           0    permanent

  [edit]

  root@ITAA# run show security ike security-associations

  Index   State  Initiator cookie  Responder cookie  Mode           Remote Address

  5147891 UP     4562194f6fbb0890  8ed18385b01ec19a  Aggressive     100.1.1.254

  root@ITAA# run show security ipsec security-associations

  Total active tunnels: 1

  ID    Algorithm       SPI      Life:sec/kb  Mon lsys Port  Gateway

  <268173313 ESP:aes-cbc-128/sha1 5dcb207b 2756/  500000 – root 51757 100.1.1.254

  >268173313 ESP:aes-cbc-128/sha1 6e86077d 2756/  500000 – root 51757 100.1.1.254

  [edit]

  root@ITAA# run show security ipsec statistics

  ESP Statistics:

  Encrypted bytes:                1500

  Decrypted bytes:               1500

  Encrypted packets:             10

  Decrypted packets:             10

  AH Statistics:

  Input bytes:                    0

  Output bytes:                   0

  Input packets:                  0

  Output packets:                 0

  Errors:

  AH authentication failures: 0, Replay errors: 0

  ESP authentication failures: 0, ESP decryption failures: 0

  Bad headers: 0, Bad trailers: 0

 

上一篇:安卓防火墙 PS DroidWall

下一篇:从安全信息管理系统获得可操作的结果(一)