What you want to do is use VTI on the Cisco side.  Search for Cisco VTI 
(Virtual Tunnel Interface) or "tunnel protection" for more info & config 
examples.

With tunnel protect, you can create a routable virtual tunnel that uses 
0.0.0.0/0.0.0.0/0 as the proxy ID and it interoperates just fine with Juniper 
route-based VPNs (M, SRX, SSG, even older NetScreens) -- assuming you match on 
the P1 & P2 proposals.

We do it all the time as it lets us:
(1) run a routing protocol over the tunnel without the GRE overhead
(2) create more granular firewall policies for intra-VPN traffic
(3) simpler configuration
(4) easier troubleshooting
(5) better manage mixed environments

--
Nathan

-----Original Message-----
From: juniper-nsp-boun...@puck.nether.net 
[mailto:juniper-nsp-boun...@puck.nether.net] On Behalf Of Tom Devries
Sent: Wednesday, October 27, 2010 11:42 AM
To: Morten Isaksen
Cc: Juniper-Nsp
Subject: Re: [j-nsp] Junos route based vpn with Cisco

Indeed, the only issue I see with policy based vpn's is the number of vpn 
policies required for the amount of networks that have to be encrypted.  As 
someone pointed out on another list, the C device should support null proxy ids 
if you first deny all other networks and then specify "any any" as interesting.


-----Original Message-----
From: misak...@gmail.com [mailto:misak...@gmail.com] On Behalf Of Morten Isaksen
Sent: October-27-10 1:30 PM
To: Tom Devries
Cc: Juniper-Nsp
Subject: Re: [j-nsp] Junos route based vpn with Cisco

I had the same issue. I changed to policy based VPN and it worked out of the 
box.

2010/10/27 Tom Devries <tom.devr...@rci.rogers.com>:
> Thought I would provide some feedback I received from Juniper 
> regarding this question for the archives.  If using a route based vpn, 
> the proxy ID's in the SA creation will be all 0's by default:
>
> Local: 0.0.0.0
> Remote: 0.0.0.0
> Service 0
>
> so as long as it is unspecified in the config.  However if you encrypt 
> more than one source network (i.e. multiple networks behind the SRX) 
> and put multiple networks in your proxy-id config (in say, local 
> network) then that part of the SA will show as 0.0.0.0.  I haven't 
> been able to find a Cisco interop configuration that will be able to 
> create SAs and establish phase II when receiving a 0.0.0.0/0.0.0.0/0 
> proxy id from a peer (if you have one please post it).  However one 
> other way to do it would be to use GRE tunnels.
>
> So long story short, in the below configuration, proxy id's will all 
> be 0's unless I specify a proxy-id in the config, and in that case I 
> can only encrypt one network/service, as configuring more will set the 
> outgoing proxy id element to be 0's.
>
>
> Thanks,
> Tom
>
> -----Original Message-----
> From: Tom Devries
> Sent: October-22-10 4:05 PM
> To: Juniper-Nsp
> Subject: Junos route based vpn with Cisco
>
>
>
> Hi all,
>
> Question regarding JunOS (SRX) route based VPN with Cisco remote end.
> In such a route-based configuration, how are the SA's generated with 
> the Cisco?  On the Cisco side you match an ACL as interesting traffic 
> and the SA's are created based on that.  On JunOS route-based vpn, is 
> it the policy that creates the SA or does the policy simply enforce 
> the FW rules on the tunnel?  If that is the case, can I have many such 
> rules and specify ports for each rule?  In the below configuration I 
> would like to specify application ports for each rule (rather than the 
> current "any"), but I am unsure how the remote Cisco would respond 
> depending on how the Juniper creates the SA (note unnumbered ST interface 
> used)...
>
> I used the following tool to generate this config:
>
> https://www.juniper.net/customers/support/configtools/vpnconfig.html#
>
>
>
>
> ###Configure interface IP and route for tunnel traffic
>
> set interfaces st0.0 family inet
> set routing-options static route 2.16.68.0/24 next-hop st0.0 set 
> routing-options static route 2.16.69.0/24 next-hop st0.0
>
> ## Configure security zones, assign interfaces to the zones & 
> host-inbound services for each zone
>
> set security zones security-zone vpn interfaces st0.0 set security 
> zones security-zone Vpn host-inbound-traffic system-services bgp
>
> ## Configure address book entries for each zone
>
> set security zones security-zone Silver address-book address
> net-cfgr_10-25-56-64--26 10.25.56.64/26 set security zones 
> security-zone Silver address-book address
> net-cfgr_10-25-7-96--27 10.25.7.96/27
> set security zones security-zone Silver address-book address
> net-cfgr_10-25-194-96--27 10.25.194.96/27
>
> ## Configure IKE policy for main mode
>
> set security ike policy ike-policy-cfgr mode main set security ike 
> policy ike-policy-cfgr pre-shared-key ascii-text "yaright"
>
> ## Configure IKE gateway with peer IP address, IKE policy and outgoing 
> interface
>
> set security ike gateway ike-gate-cfgr ike-policy ike-policy-cfgr set 
> security ike gateway ike-gate-cfgr address 1.1.1.1 set security ike 
> gateway ike-gate-cfgr external-interface ge-0/0/12.0
>
> ## Configure IKE authentication, encryption, DH group, and Lifetime
>
> set security ike proposal ike-proposal-cfgr authentication-method 
> pre-shared-keys set security ike policy ike-policy-cfgr proposals 
> ike-proposal-cfgr set security ike proposal ike-proposal-cfgr 
> encryption-algorithm 3des-cbc set security ike proposal 
> ike-proposal-cfgr authentication-algorithm
> sha1
> set security ike proposal ike-proposal-cfgr dh-group group2 set 
> security ike proposal ike-proposal-cfgr lifetime-seconds
>
> ## Configure IPsec policy
>
> set security ipsec vpn ipsec-vpn-cfgr ike gateway ike-gate-cfgr set 
> security ipsec vpn ipsec-vpn-cfgr ike ipsec-policy ipsec-policy-cfgr 
> set security ipsec vpn ipsec-vpn-cfgr bind-interface st0.0
>
>
> ## Configure IPsec authentication and encryption
>
> set security ipsec proposal ipsec-proposal-cfgr protocol esp set 
> security ipsec policy ipsec-policy-cfgr proposals ipsec-proposal-cfgr 
> set security ipsec policy ipsec-policy-cfgr perfect-forward-secrecy 
> keys
> group2
> set security ipsec proposal ipsec-proposal-cfgr encryption-algorithm 
> 3des-cbc set security ipsec proposal ipsec-proposal-cfgr 
> authentication-algorithm
> hmac-sha1-96
>
> ## Configure security policies for tunnel traffic in outbound 
> direction
>
> set security policies from-zone Silver to-zone Vpn policy 
> Silver-Vpn-cfgr match source-address net-cfgr_10-25-56-64--26 set 
> security policies from-zone Silver to-zone Vpn policy Silver-Vpn-cfgr 
> match source-address net-cfgr_10-25-7-96--27 set security policies 
> from-zone Silver to-zone Vpn policy Silver-Vpn-cfgr match 
> source-address net-cfgr_10-25-194-96--27 set security policies 
> from-zone Silver to-zone Vpn policy Silver-Vpn-cfgr match application 
> any set security policies from-zone Silver to-zone Vpn policy 
> Silver-Vpn-cfgr then permit
>
> ## Configure security policies for tunnel traffic in inbound direction
>
> set security policies from-zone Vpn to-zone Silver policy 
> Vpn-Silver-cfgr match source-address net-cfgr_2-16-68-0--24 set 
> security policies from-zone Vpn to-zone Silver policy Vpn-Silver-cfgr 
> match source-address net-cfgr_2-16-69-0--24 set security policies 
> from-zone Vpn to-zone Silver policy Vpn-Silver-cfgr match 
> destination-address net-cfgr_10-25-56-64--26 set security policies 
> from-zone Vpn to-zone Silver policy Vpn-Silver-cfgr match 
> destination-address net-cfgr_10-25-7-96--27 set security policies 
> from-zone Vpn to-zone Silver policy Vpn-Silver-cfgr match 
> destination-address net-cfgr_10-25-194-96--27 set security policies 
> from-zone Vpn to-zone Silver policy Vpn-Silver-cfgr match application 
> any set security policies from-zone Vpn to-zone Silver policy 
> Vpn-Silver-cfgr then permit
>
> Thanks,
> Tom
>
>
> This e-mail (and attachment(s)) is confidential, proprietary, may be subject 
> to copyright and legal privilege and no related rights are waived. If you are 
> not the intended recipient or its agent, any review, dissemination, 
> distribution or copying of this e-mail or any of its content is strictly 
> prohibited and may be unlawful. All messages may be monitored as permitted by 
> applicable law and regulations and our policies to protect our business. 
> E-mails are not secure and you are deemed to have accepted any risk if you 
> communicate with us by e-mail. If received in error, please notify us 
> immediately and delete the e-mail (and any attachments) from any computer or 
> any storage medium without printing a copy.
>
> Ce courriel (ainsi que ses pièces jointes) est confidentiel, exclusif, et 
> peut faire l'objet de droit d'auteur et de privilège juridique; aucun droit 
> connexe n'est exclu. Si vous n'êtes pas le destinataire visé ou son 
> représentant, toute étude, diffusion, transmission ou copie de ce courriel en 
> tout ou en partie, est strictement interdite et peut être illégale. Tous les 
> messages peuvent être surveillés, selon les lois et règlements applicables et 
> les politiques de protection de notre entreprise. Les courriels ne sont pas 
> sécurisés et vous êtes réputés avoir accepté tous les risques qui y sont liés 
> si vous choisissez de communiquer avec nous par ce moyen. Si vous avez reçu 
> ce message par erreur, veuillez nous en aviser immédiatement et supprimer ce 
> courriel (ainsi que toutes ses pièces jointes) de tout ordinateur ou support 
> de données sans en imprimer une copie.
>
> _______________________________________________
> juniper-nsp mailing list juniper-nsp@puck.nether.net 
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>



--
Morten Isaksen

_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to