In policy based VPN just rely on default route, witch points out the interface 
and  zone where the VPN's outgoing interface resides. The packets have to hit 
the policy between the internal and external zone, then are injected to the 
VPN. No additional route is needed. 




Klaus

—
Sent from Mailbox for iPhone

On Thu, Nov 21, 2013 at 4:29 PM, Per Westerlund <p...@westerlund.se> wrote:

> Sorry, no automatic route-injection with SRX and policy-based IPsec VPN. The 
> traffic has to be made to "hit" the security policy rules that allows the 
> tunnel traffic, and that is normally manually.
> /Per
> 21 nov 2013 kl. 16:17 skrev Michael Hallgren <m.hallg...@free.fr>:
>> Hi,
>> 
>> I ran into the following:
>> 
>> In a pretty much standard setup of a policy-based IPSec VPN between a
>> SRX and a cisco ASA, pinging destination behind the SRX worked just
>> fine from behind the ASA, the other way around didn't. Had few static
>> routes set, among them a 0/0 pointing in the direction of the ASA, and a
>> 10/8 pointing at SRX customers. The host behind the ASA, that I couldn't
>> ping was in 10/24, say. Adding a static route 10/24 pointing at the ASA (not
>> at the tunnel endpoint), fixed the flow from SRX to ASA.
>> 
>> Was under the impression that policy-based setup is supposed to handle
>> static route injection "auto-magically." What am I missing?
>> 
>> Cheers,
>> 
>> mh
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp@puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
> _______________________________________________
> juniper-nsp mailing list juniper-nsp@puck.nether.net
> https://puck.nether.net/mailman/listinfo/juniper-nsp
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to