SRX

last person joined: yesterday 

Ask questions and share experiences about the SRX Series, vSRX, and cSRX.
  • 1.  Dynamic VPN web page on a different TCP port

    Posted 01-14-2013 00:47

    Hello.

     

     

    I face the following issue:

    1. dynamic-vpn on the external port ge-0/0/0.0 works fine with the configuration displayed below specifying the address https://<ip>/dynamic-vpn

    2. i try to change the default ports for https (10443) and http (10080) for web side, as following:

    set system services web-management https port 8443

    set system services web-management http port 10080

    3. After this configuration is made, i encountered the following behavior:

    3.1. on the internal interface ge-0/0/1.0 i'm able to connect to j-web page using https://<ip>:8443

    3.2. on the external interface ge-0/0/0.0, when lunching dynamic vpn page using https://<ip>:8443/dynamic-vpn i get no page (blank page that is stuck in loading).

     

    Can you, please, provide me a hint where the problem from point 3.2 may be?

     

     

     

     

    root@srxName01# show
    ## Last changed: 2013-01-11 18:55:47 EET
    version 11.2R4.3;
    system {
        root-authentication {
            encrypted-password "$1$3PzTv3cu$fsIoZIldb8wRu30noWDUZ0"; ## SECRET-DATA
        }
        name-server {
            208.67.222.222;
            208.67.220.220;
        }
        services {
            ssh;
            telnet;
            xnm-clear-text;
            web-management {
                http {
                    interface [ ge-0/0/1.0 ge-0/0/2.0 ge-0/0/3.0 ge-0/0/0.0 ];
                }
                https {
                    system-generated-certificate;
                    interface [ ge-0/0/1.0 ge-0/0/2.0 ge-0/0/3.0 ge-0/0/0.0 ];
                }
            }
        }
        syslog {
            user * {
                any emergency;
            }
            file messages {
                any critical;
                authorization info;
            }
            file interactive-commands {
                interactive-commands error;
            }
        }
        max-configurations-on-flash 5;
        max-configuration-rollbacks 5;
        license {
            autoupdate {
                url https://ae1.juniper.net/junos/key_retrieval;
            }
        }
    }
    interfaces {
        ge-0/0/0 {
            unit 0 {
                family inet {
                    address 172.18.20.40/24;
                }
            }
        }
        ge-0/0/1 {
            unit 0 {
                family inet {
                    address 172.18.19.40/24;
                }
            }
        }
        ge-0/0/2 {
            unit 0;
        }
        ge-0/0/3 {
            unit 0;
        }
    }
    security {
        ike {
            policy ike-dyn-vpn-policy {
                mode aggressive;
                proposal-set standard;
                pre-shared-key ascii-text "$9$KnIvX-dVs4JDbsz6/9pu8X7Nds"; ## SECRET-DATA
            }
            gateway dyn-vpn-local-gw {
                ike-policy ike-dyn-vpn-policy;
                dynamic {
                    hostname dynvpn;
                    connections-limit 10;
                    ike-user-type group-ike-id;
                }
                external-interface ge-0/0/0.0;
                xauth access-profile dyn-vpn-access-profile;
            }
        }
        ipsec {
            policy ipsec-dyn-vpn-policy {
                proposal-set standard;
            }
            vpn dyn-vpn {
                ike {
                    gateway dyn-vpn-local-gw;
                    ipsec-policy ipsec-dyn-vpn-policy;
                }
            }
        }
        dynamic-vpn {
            access-profile dyn-vpn-access-profile;
            clients {
                all {
                    remote-protected-resources {
                        10.0.0.0/8;
                    }
                    remote-exceptions {
                        0.0.0.0/0;
                    }
                    ipsec-vpn dyn-vpn;
                    user {
                        client1;
                    }
                }
            }
        }
        screen {
            ids-option untrust-screen {
                icmp {
                    ping-death;
                }
                ip {
                    source-route-option;
                    tear-drop;
                }
                tcp {
                    syn-flood {
                        alarm-threshold 1024;
                        attack-threshold 200;
                        source-threshold 1024;
                        destination-threshold 2048;
                        timeout 20;
                    }
                    land;
                }
            }
        }
        nat {
            source {
                rule-set trust-to-untrust {
                    from zone trust;
                    to zone untrust;
                    rule source-nat-rule {
                        match {
                            source-address 0.0.0.0/0;
                        }
                        then {
                            source-nat {
                                interface;
                            }
                        }
                    }
                }
            }
        }
        policies {
            from-zone trust to-zone untrust {
                policy trust-to-untrust {
                    match {
                        source-address any;
                        destination-address any;
                        application any;
                    }
                    then {
                        permit;
                    }
                }
            }
            from-zone trust to-zone trust {
                policy trust-to-trust {
                    match {
                        source-address any;
                        destination-address any;
                        application any;
                    }
                    then {
                        permit;
                    }
                }
            }
            from-zone untrust to-zone trust {
                policy dyn-vpn-policy {
                    match {
                        source-address any;
                        destination-address any;
                        application any;
                    }
                    then {
                        permit {
                            tunnel {
                                ipsec-vpn dyn-vpn;
                            }
                        }
                    }
                }
            }
        }
        zones {
            security-zone trust {
                host-inbound-traffic {
                    system-services {
                        all;
                    }
                    protocols {
                        all;
                    }
                }
                interfaces {
                    ge-0/0/1.0;
                    ge-0/0/2.0;
                    ge-0/0/3.0;
                }
            }
            security-zone untrust {
                screen untrust-screen;
                interfaces {
                    ge-0/0/0.0 {
                        host-inbound-traffic {
                            system-services {
                                dhcp;
                                tftp;
                                ike;
                                https;
                                ping;
                                ssh;
                                http;
                            }
                        }
                    }
                }
            }
        }
    }
    access {
        profile dyn-vpn-access-profile {
            client client1 {
                firewall-user {
                    password "$9$sWYaUDjkPT3ik1hcSeK4aZGDk"; ## SECRET-DATA
                }
            }
            address-assignment {
                pool dyn-vpn-address-pool;
            }
        }
        address-assignment {
            pool dyn-vpn-address-pool {
                family inet {
                    network 10.10.10.0/24;
                    xauth-attributes {
                        primary-dns 8.8.8.8/32;
                    }
                }
            }
        }
        firewall-authentication {
            web-authentication {
                default-profile dyn-vpn-access-profile;
            }
        }
    }

     



  • 2.  RE: Dynamic VPN web page on a different TCP port
    Best Answer

    Posted 01-14-2013 04:26

    The following link may be useful:

     

    http://kb.juniper.net/InfoCenter/index?page=content&id=KB23720

     

    Might be worth a ticket to JTAC though just confirm it has not changed in any recent release and if it hasnt you may get some info as to when it will be a feature.