SRX Services Gateway
Reply
Contributor
fahad.khan@gmail.com
Posts: 10
Registered: ‎06-18-2009
0

VPN Setup - Best practices

Hi Folks,

 

One of my customers is a  banking environment in which SRX3600 (in Cluster) is working as the core device at head office on which all of the braches (with SSG140) are connected over route based IPSEC VPN. All branches have redundant VPNs as we normally dual Service providers for redundancy.

 

Please note we use Static routing only.

 

I have enabled "establiched tunnel immediately" and "VPN monitoring Optimized" on SRX side and "VPN monitoring" and "rekey" enabled on Branch (SSG140) side. Is it the correct setup??? I am experiancing some problems like some times traffic completely dropped on particular VPN tunnel and at that moment what I see

 

On SRX side :

 

Phase 2 = down, Phase 1 = up, st0.x = up

 

On branch side

 

Phase 2 = up, phase 1 = up, tunnel.x = up

 

What do you suggest??? should i disabled rekey on SSG140?? what are the best practices in such env??

 

Thanks in adv,

 

regards,

 

 

 

 

Super Contributor
colemtb
Posts: 312
Registered: ‎09-30-2009
0

Re: VPN Setup - Best practices

Similar to the SRX "security / ipsec / vpn temp / vpn-monitor" is there a destination IP option on the SSG?  Sounds like the vpn-monitor on the SSG side isn't up to snuff with that's actually happening on the SRX side.  When I do SRX to SRX, since my core is a multipoint secure tunnel and I NEED route awareness...  I have destination IPs on both ends point to the other sides st0.x interface and therefore can remove routes from the NHTB table if the link goes down.  I haven't seen the need for DPD on IKE if timers are sets appropriately, but I don't think that would be your issue here. 

 

Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.