Screen OS

last person joined: 8 months ago 

This is a legacy community with limited Juniper monitoring.
  • 1.  VPN Tunnel not firing off

    Posted 06-08-2011 15:23

    I have a SSG running 6.3.0r7.0 that I've configured with a simple route based VPN back to my corporate office NS50. The phase 1& 2 config are configured correctly and tied to a tunnel interface. Both the tunnel interface and the bgroup0 interface have ospf configured for the correct areas which is usually enough to start the VPN tunnel to start up. I'm not seeing any activity (logs are empty, no attempts being made that I can see) on the remote SSG or the corporate NS50 that it is tying back to and can't get this VPN tunnel to work. I'm open to suggestions on how to start troubleshooting this. JTAC isn't an option. This unit isn't under warranty. Any help would be golden.

    -J

     

    unset key protection enable
    set clock ntp
    set clock timezone -8
    set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
    set vrouter trust-vr sharable
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset auto-route-export
    set protocol ospf
    set area 0.0.0.21 
    exit
    exit
    set alg appleichat enable
    unset alg appleichat re-assembly enable
    set alg sctp enable
    set auth-server "Local" id 0
    set auth-server "Local" server-name "Local"
    set auth default auth server "Local"
    set auth radius accounting port 1646
    set admin name "administrator"
    set admin password "xxxxx"
    set admin auth web timeout 10
    set admin auth dial-in timeout 3
    set admin auth server "Local"
    set admin format dos
    set zone "Trust" vrouter "trust-vr"
    set zone "Untrust" vrouter "trust-vr"
    set zone "DMZ" vrouter "trust-vr"
    set zone "VLAN" vrouter "trust-vr"
    set zone id 100 "Home"
    set zone "Untrust-Tun" vrouter "trust-vr"
    set zone "Trust" tcp-rst 
    set zone "Untrust" block 
    unset zone "Untrust" tcp-rst 
    set zone "MGT" block 
    unset zone "V1-Trust" tcp-rst 
    unset zone "V1-Untrust" tcp-rst 
    set zone "DMZ" tcp-rst 
    unset zone "V1-DMZ" tcp-rst 
    unset zone "VLAN" tcp-rst 
    set zone "Home" tcp-rst 
    set zone "Untrust" screen tear-drop
    set zone "Untrust" screen syn-flood
    set zone "Untrust" screen ping-death
    set zone "Untrust" screen ip-filter-src
    set zone "Untrust" screen land
    set zone "V1-Untrust" screen tear-drop
    set zone "V1-Untrust" screen syn-flood
    set zone "V1-Untrust" screen ping-death
    set zone "V1-Untrust" screen ip-filter-src
    set zone "V1-Untrust" screen land
    set interface "ethernet0/0" zone "Untrust"
    set interface "ethernet0/1" zone "DMZ"
    set interface "bgroup0" zone "Trust"
    set interface "bgroup1" zone "Home"
    set interface "tunnel.1" zone "Trust"
    set interface bgroup0 port ethernet0/2
    set interface bgroup0 port ethernet0/3
    set interface bgroup1 port ethernet0/4
    set interface bgroup1 port ethernet0/5
    set interface bgroup1 port ethernet0/6
    unset interface vlan1 ip
    set interface ethernet0/0 ip 192.168.1.86/24
    set interface ethernet0/0 nat
    set interface bgroup0 ip x.x.81.1/21
    set interface bgroup0 nat
    set interface bgroup1 ip 192.168.21.1/24
    set interface bgroup1 nat
    set interface tunnel.1 ip 172.16.5.21/24
    set interface tunnel.1 mtu 1500
    unset interface vlan1 bypass-others-ipsec
    unset interface vlan1 bypass-non-ip
    set interface ethernet0/0 ip manageable
    set interface bgroup0 ip manageable
    set interface bgroup1 ip manageable
    set interface bgroup0 manage mtrace
    set interface ethernet0/0 dhcp client enable
    set interface ethernet0/1 dhcp client enable
    unset interface ethernet0/1 dhcp client settings update-dhcpserver
    set interface bgroup0 dhcp server service
    set interface bgroup0 dhcp server auto
    set interface bgroup0 dhcp server option gateway x.x.81.1 
    set interface bgroup0 dhcp server option netmask 255.255.248.0 
    set interface bgroup0 dhcp server option dns1 x.x.0.21 
    set interface bgroup0 dhcp server option dns2 x.x.0.20 
    set interface bgroup0 dhcp server option wins1 x.x.0.21 
    set interface bgroup0 dhcp server ip x.x.80.10 to x.x.80.20 
    unset interface bgroup0 dhcp server config next-server-ip
    unset interface bgroup0 dhcp server config updatable
    set interface "serial0/0" modem settings "USR" init "AT&F"
    set interface "serial0/0" modem settings "USR" active
    set interface "serial0/0" modem speed 115200
    set interface "serial0/0" modem retry 3
    set interface "serial0/0" modem interval 10
    set interface "serial0/0" modem idle-time 10
    set flow tcp-mss
    unset flow tcp-syn-check
    unset flow tcp-syn-bit-check
    set flow reverse-route clear-text prefer
    set flow reverse-route tunnel always
    set pki authority default scep mode "auto"
    set pki x509 default cert-path partial
    set crypto-policy
    exit
    set ike gateway "Gateway to WM_IR" address x.x.x.x id "rtr-sls-agnt08@company.com" Aggr local-id "rtr-sls-agnt08@company.com" outgoing-interface "ethernet0/0" preshare "wGHinK0mNmFEQlscvwC87+CYaOncKtbWwg==" sec-level compatible
    set ike gateway "Gateway to WM_IR" cert peer-ca-hash 48B76449F3D5FEFA1133AA805E420F0FCA643651
    set ike respond-bad-spi 1
    set ike ikev2 ike-sa-soft-lifetime 60
    unset ike ikeid-enumeration
    unset ike dos-protection
    unset ipsec access-session enable
    set ipsec access-session maximum 5000
    set ipsec access-session upper-threshold 0
    set ipsec access-session lower-threshold 0
    set ipsec access-session dead-p2-sa-timeout 0
    unset ipsec access-session log-error
    unset ipsec access-session info-exch-connected
    unset ipsec access-session use-error-log
    set vpn "VPN to WM_IR" gateway "Gateway to WM_IR" no-replay tunnel idletime 0 sec-level compatible
    set vpn "VPN to WM_IR" id 0x1 bind interface tunnel.1
    set url protocol websense
    exit
    set policy id 1 from "Trust" to "Untrust"  "Any" "Any" "ANY" permit 
    set policy id 1
    exit
    set nsmgmt bulkcli reboot-timeout 60
    set ssh version v2
    set config lock timeout 5
    unset license-key auto-update
    set telnet client enable
    set ntp server "x.x.9.5"
    set ntp server src-interface "bgroup0"
    set ntp server backup1 "x.x.1.5"
    set ntp server backup1 src-interface "bgroup0"
    set ntp interval 60
    set ntp max-adjustment 3600
    set snmp port listen 161
    set snmp port trap 162
    set snmpv3 local-engine id "0162112007001495"
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    unset add-default-route
    exit
    set interface bgroup0 protocol ospf area 0.0.0.21
    set interface bgroup0 protocol ospf enable
    set interface bgroup0 protocol ospf cost 1
    set interface tunnel.1 protocol ospf area 0.0.0.0
    set interface tunnel.1 protocol ospf enable
    set interface tunnel.1 protocol ospf cost 7832
    set vrouter "untrust-vr"
    exit
    set vrouter "trust-vr"
    exit

     



  • 2.  RE: VPN Tunnel not firing off

    Posted 06-08-2011 16:28

    You said it's a route-based VPN -- where's the route?



  • 3.  RE: VPN Tunnel not firing off

    Posted 06-08-2011 16:31

    OSPF tied to the tunnel interface and bgroup0. I've never needed to set a static route on one of these vpn tunnels. Once I tied OSPF to the tunnel interface the VPN would fire off.

    -J

     



  • 4.  RE: VPN Tunnel not firing off
    Best Answer

    Posted 06-08-2011 16:40

    nevermind, it helps if I have OSPF enabled. 🙂 It wasn't and now it is. The tunnel has initiated and routes are being passed back and forth. Thanks for the help.

    J