Set vpn "Site-A_PRI-Site-B_SEC IKE" monitor optimized rekey Set vpn "Site-A_PRI-Site-B_SEC IKE" gateway "Site-A_PRI-Site-B_SEC" no-replay tunnel idletime 0 proposal "g2-esp-aes128-sha" Set vpn "Site-A_SEC-Site-B_PRI IKE" dscp-mark 0 Set vpn "Site-A_SEC-Site-B_PRI IKE" id 0x3 bind interface tunnel.2 Set vpn "Site-A_SEC-Site-B_PRI IKE" monitor optimized rekey Set vpn "Site-A_SEC-Site-B_PRI IKE" gateway "Site-A_SEC-Site-B_PRI" no-replay tunnel idletime 0 proposal "g2-esp-aes128-sha" Set vpn "Site-A_PRI-Site-B_PRI IKE" id 0圆 bind interface tunnel.1 Set vpn "Site-A_PRI-Site-B_PRI IKE" monitor optimized rekey Set vpn "Site-A_PRI-Site-B_PRI IKE" gateway "Site-A_PRI-Site-B_PRI" no-replay tunnel idletime 0 proposal "g2-esp-aes128-sha" Set ike gateway "Site-A_SEC-Site-B_SEC" address 192.0.2.34 Main outgoing-interface "ethernet0/1" preshare EnterYourPSKHere proposal "pre-g2-aes128-sha" Set ike gateway "Site-A_SEC-Site-B_PRI" address 192.0.2.18 Main outgoing-interface "ethernet0/1" preshare EnterYourPSKHere proposal "pre-g2-aes128-sha" Set ike gateway "Site-A_PRI-Site-B_SEC" address 192.0.2.34 Main outgoing-interface "ethernet0/0" preshare EnterYourPSKHere proposal "pre-g2-aes128-sha"
Set ike gateway "Site-A_PRI-Site-B_PRI" address 192.0.2.18 Main outgoing-interface "ethernet0/0" preshare EnterYourPSKHere proposal "pre-g2-aes128-sha" This is done with a new Zone in the trust-vr and we will need four numbered tunnel interfaces on each firewall. Once you have the two firewalls setup with each Internet connection in its own virtual router we need to setup the VPNs. The first thing we need to do in order to implement this is to put each Internet connection into its own Virtual Router so they can run independently of each other.I have covered this in a recent blog post which you can read here. In this instance I decided to make use of OSPF to dynamically route the traffic depending on the availability of the VPNs at each site. With the Juniper SSG firewalls it is possible to use Policy Based VPNs to maintain multiple tunnels and have the firewalls switch between these as required however you end up with four policies on each firewall and you cannot tell from looking at a routing table where the traffic is flowing. Each site has a Juniper SSG5-SB firewall as well as a 10Mbit leased line primary Internet circuit and an ADSL backup. Also note that the Hex ID was used when using the `clear sa` command.Ĭlick here for Fir3nets Netscreen Site 2 Site VPN troubleshooting guide.Having a Single Point of Failure (SPoF) on your network is never a desirable situation and recently I implemented a multi-site set-up where each site had two internet connections and there was a requirement to enable the satellite office to connect to the head office at all times.
You can tell that they are active as the “Sta” (State) is A/- which is active. The main thing to ensure is that you show only the active sa`s as the firewall will not let you clear inactive sa`s. To clear either of these run either or of the following commands, clear ike-cookie īelow shows you an example of clear a VPN`s SA`s, ns5gt-> get sa active In order to find the current IKE Cookies or SA`s, run either of the following commands, get ike cookies
To see an overview of your VPN`s run the command, ` get vpn` Phase 1 being the IKE cookies and phase 2 being the SA`s (Security Association). In order to rekey a Netscreen VPN you will need to either clear the phase 1 or phase 2 “keys” from the gateway.