Quantcast
Channel: All SRX Services Gateway posts
Viewing all articles
Browse latest Browse all 17645

ipsec vpn config on MX80 MIC card

$
0
0

Hello forum guys and security experts,

 

I need some help with ipsec configuration. I followed guide from http://www.juniper.net/techpubs/en_US/junos13.2/topics/example/ipsec-configuring-on-ms-mic.html

 

this is my security configuration for ike and vpn: 

 

 service-set ipsec_ss_ms-0_2_0_1 {
next-hop-service {
inside-service-interface ms-0/2/0.1;
outside-service-interface ms-0/2/0.2;
}
ipsec-vpn-options {
local-gateway 10.42.131.81;
}
ipsec-vpn-rules vpn_rule_eNB101032_Uplane;

rule vpn_rule_eNB101032_Uplane { term vpn_rule_eNB101032_Uplane { from { source-address { 10.42.131.84/32; } destination-address { 10.42.159.5/32; } } then { remote-gateway 10.42.147.32; dynamic { ike-policy all-ca-level-l3; ipsec-policy Feve3-TT_ipsec_policy; } } } match-direction input; } ipsec { proposal Feve3-TT_ipsec_proposal { protocol esp; authentication-algorithm hmac-sha1-96; encryption-algorithm 3des-cbc; lifetime-seconds 3600; } policy Feve3-TT_ipsec_policy { proposals Feve3-TT_ipsec_proposal; } } ike { proposal Feve3-TT_ike_proposal { authentication-method rsa-signatures; dh-group group2; authentication-algorithm sha1; encryption-algorithm aes-128-cbc; lifetime-seconds 3600; } policy all-ca-level-l1 { mode main; version 1; proposals Feve3-TT_ike_proposal; local-certificate CA_Level_L1a; } policy all-ca-level-l2 { mode main; proposals Feve3-TT_ike_proposal; local-certificate CA_Level_L2a; } policy all-ca-level-l3 { mode main; proposals Feve3-TT_ike_proposal; local-certificate CA_Level_L3a; } } traceoptions { file ipsec-ike_log size 5m files 10; flag all; }

I also created subinterfaces under mc and assigned to proper domain: 

 

run show configuration interfaces ms-0/2/0
unit 0 {
    family inet;
}
unit 1 {
    family inet {
        mtu 1500;
        address 10.42.131.81/28;
        address 10.42.131.82/28;
        address 10.42.131.83/28;
        address 10.42.131.84/28;
        address 10.42.131.85/28;
        address 10.42.131.86/28;
    }
    service-domain inside;
}
unit 2 {
    family inet;
    service-domain outside;
}

 policy is routed staticly via ms-0/2/0.1

 

run show route 10.42.159.5

inet.0: 292 destinations, 293 routes (292 active, 0 holddown, 0 hidden)
+ = Active Route, - = Last Active, * = Both

10.42.159.5/32     *[Static/5] 1w3d 06:19:17
                    > via ms-0/2/0.1

MX is also vlan GW for hosts - so is both vlan GW and SecGEW. I know it is not really recomended design - but Juniper by providing MIC card, left that option available. So we use it. 

 

policy is using digital certifiactes: 

 

 run show security pki local-certificate brief
Certificate identifier: CA_Level_L2a
  Issued to: JuniperSRX, Issued by: DC = NSN Ulm, DC = Intermediate, CN = Sub CA_L2a
  Validity:
    Not before: 09- 5-2016 06:26 UTC
    Not after: 12- 4-2016 23:59 UTC
  Public key algorithm: rsaEncryption(2048 bits)

Certificate identifier: CA_Level_L3a
  Issued to: JuniperSRX, Issued by: DC = NSN Ulm, DC = Intermediate, CN = Sub CA_L3a
  Validity:
    Not before: 09- 5-2016 08:36 UTC
    Not after: 09- 5-2019 23:59 UTC
  Public key algorithm: rsaEncryption(2048 bits)

Certificate identifier: CA_Level_L1a
  Issued to: JuniperSRX, Issued by: DC = NSN Ulm, CN = Root CA
  Validity:
    Not before: 09- 5-2016 06:23 UTC
    Not after: 09- 5-2019 23:59 UTC
  Public key algorithm: rsaEncryption(2048 bits)

which are loaded and can be verified. 

 

 However I do not see any logs in traceoption I set: 

 

run show log ipsec-ike_log
16 12:50:17 Enable trace flag: ffffffff trace level: 0
Sep 16 12:50:18 Enable trace flag: ffffffff trace level: 0
Sep 16 14:23:20 Enable trace flag: ffffffff trace level: 0
Sep 16 14:23:21 Enable trace flag: ffffffff trace level: 0
Sep 16 15:02:08 Enable trace flag: ffffffff trace level: 0
Sep 16 15:02:08 Enable trace flag: ffffffff trace level: 0
Sep 16 15:03:21 Enable trace flag: ffffffff trace level: 0
Sep 16 15:03:21 Enable trace flag: ffffffff trace level: 0

ike security association can not establish: 

 

run show services ipsec-vpn ike security-associations brief

[edit]

for phase 2 I see following: 

 

run show services ipsec-vpn ipsec security-associations ipsec_ss_ms-0_2_0_1
Service set: ipsec_ss_ms-0_2_0_1, IKE Routing-instance: default

  Rule: vpn_rule_eNB101032_Uplane, Term: vpn_rule_eNB101032_Uplane, Tunnel index: 3
  Local gateway: 10.42.131.81, Remote gateway: 10.42.147.32
  IPSec inside interface: ms-0/2/0.1, Tunnel MTU: 1500

  --- No IPSec SA information available ---

Any idea what is missing ? 

 

 

 


Viewing all articles
Browse latest Browse all 17645

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>