1. Trang chủ
  2. » Công Nghệ Thông Tin

netscreen concepts examples vpns phần 3 doc

27 218 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 27
Dung lượng 236,8 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

1HW6FUHHQ&RQFHSWV [DPSOHV²9ROXPH931V 7 811/ , 175$&6 When you configure the remote gateway for a VPN tunnel, you must also specify a security zone interface as the local gateway2.. You c

Trang 1

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

6SHFLI\LQJ(LWKHU&5/RU2&63IRU5HYRFDWLRQ&KHFNLQJ

To specify the revocation check method (CRL, OCSP, both, or none) for a certificate of a particular CA, use the following CLI syntax:

ns-> set pki authority id_num cert-status revoc { CRL | OCSP | all | none }

where id_num is the identification number for the certificate.

The following example specifies OCSP revocation checking

ns-> set pki authority 3 cert-status revocation-check ocsp

The ID number 3 identifies the certificate of the CA

'LVSOD\LQJ&HUWLILFDWH5HYRFDWLRQ6WDWXV$WWULEXWHV

To display the revocation check attributes for a particular CA, use the following CLI syntax:

ns-> get pki authority id_num cert-status

where id_num is the identification number for the certificate issued by the CA.

To display the revocation status attributes for the CA that issued certificate 7:

ns-> get pki authority 7 cert-status

6SHFLI\LQJWKH85/RIDQ2&635HVSRQGHUIRUD&HUWLILFDWH

To specify the URL string of an OCSP responder for a particular certificate, use the following CLI syntax:

ns-> set pki authority id_num cert-status ocsp url url_str

To specify the URL string of an OCSP responder (http:\\192.168.10.10) for the CA with certificate at index 5, use the following CLI syntax:

ns-> set pki authority 5 cert-status ocsp url http:\\192.168.10.10

To remove the URL (http:\\192.168.2.1) of a CRL server for a certificate 5:

ns-> unset pki authority 5 cert-status ocsp url http:\\192.168.2.1

Trang 2

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

5HPRYLQJ&HUWLILFDWH5HYRFDWLRQ&KHFN$WWULEXWHV

To remove all attributes related to a certificate revocation check for a CA that issued a particular certificate, use the following syntax:

ns-> unset pki authority id_num cert-status

To remove all revocation attributes related to certificate 1:

ns-> unset pki authority 1 cert-status

Trang 3

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

Trang 4

&KDSWHU

5RXWLQJ%DVHG931V

The configuration of a NetScreen device for virtual private network (VPN) support is particularly flexible In

ScreenOS releases prior to 3.1.0, VPN tunnels are treated as objects (or building blocks) that together with source, destination, service, and action, comprise a policy that permits VPN traffic (Actually, the VPN policy action is

tunnel, but the action permit is implied, if unstated) In ScreenOS 3.1.0, the concept of a VPN tunnel shifted In

addition1 to the previous notion of a tunnel as an object used to build policies—see Chapter 4,“Policy-Based VPNs”

on page 123—a tunnel can also be viewed as a network resource used to transport traffic Thus, you can consider a tunnel as a means for delivering traffic between points A and B, and a policy as a method for either permitting or denying the delivery of that traffic Simply put, ScreenOS allows you the freedom to decouple the regulation of traffic from the means of its delivery

This chapter presents an overview and offers examples of the following routing-based VPN concepts:

“Tunnel Interfaces” on page 48

– “Example: Tunnel Bound to Tunnel Interface” on page 49

– “Example: Deleting a Tunnel Interface” on page 57

“LAN-to-LAN VPNs” on page 58

– “Example: Routing-Based LAN-to-LAN VPN, Manual Key” on page 59

– “Example: Routing-Based LAN-to-LAN VPN, AutoKey IKE” on page 70

– “Example: Routing-Based LAN-to-LAN VPN, Dynamic Peer” on page 76

“Dialup-to-LAN VPN, Dynamic Peer” on page 92

– “Example: Routing-Based Dialup-to-LAN VPN, Dynamic Peer” on page 93

“Hub-and-Spoke VPNs” on page 103

– “Example: Hub-and-Spoke VPNs” on page 104

“Back-to-Back VPNs” on page 111

– “Example: Back-to-Back VPNs” on page 112

1 ScreenOS releases after 3.1.0 continues to support pre-ScreenOS 3.1.0 VPN configuration concepts and methods.

Trang 5

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

7 811(/ , 17(5)$&(6

When you configure the remote gateway for a VPN tunnel, you must also specify a security zone interface as the local gateway2 Beyond the VPN tunnel termination points (the local and remote gateways), you can also configure tunnel interfaces in either a security zone or in a tunnel zone through which the NetScreen device directs traffic to and from the VPN tunnel3 You can bind a VPN tunnel to a specific numbered (with IP address/netmask) or

unnumbered (without IP address/netmask) tunnel interface in a security zone If the tunnel interface is unnumbered,

it borrows the IP address from the interface of the security zone in which you created it Now you have a VPN tunnel that is bound both to a tunnel interface and to a local security zone interface

Conceptually, you can view VPN tunnels as pipes that you have laid They extend from the local device to remote gateways, and the tunnel interfaces are the openings to these pipes The pipes are always there, available for use whenever the routing engine directs traffic to one of their interfaces

2 Your IKE peer uses the IP address of your local gateway interface (or outgoing-interface) when configuring the remote gateway on his NetScreen device.

3 If you do not specify a tunnel interface, the tunnel uses the default interface for the security zone.

When a numbered tunnel interface is in a tunnel zone, you cannot bind a VPN tunnel to the tunnel interface You can only bind a tunnel to the tunnel zone This allows multiple tunnel interfaces to link to a single tunnel, or multiple tunnels to link to a single tunnel interface In such cases, you must create a policy-based VPN configuration.

When a tunnel interface is in a security zone, you must bind a VPN tunnel to the tunnel interface Doing so allows you to create a routing-based VPN configuration.

The tunnel interface can be numbered or unnumbered If it is unnumbered, the tunnel interface borrows the IP address from the security zone interface Note: Only a numbered tunnel interface (that is, an interface with an IP address and netmask) can support policy-based NAT.

When a numbered tunnel interface is in a security zone and is the only interface

in that zone, you do not need to create a security zone interface In this case, the security zone supports VPN traffic via the tunnel interface, but no other kind

of traffic.

Security Zone

Tunnel Zone

Tunnel Interfaces

Security Zone Interfaces

Trang 6

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

Generally, assign an IP address to a tunnel interface if you want the interface to support policy-based NAT For more information about VPNs and policy-based NAT, see “Tunnel Zones and Policy-Based NAT” on page 202 You can create a numbered tunnel interface in either a tunnel zone or security zone

If the tunnel interface does not need to support policy-based NAT, and your configuration does not require the tunnel interface to be bound to a tunnel zone, you can specify the interface as unnumbered You must bind an unnumbered tunnel interface to a security zone; you cannot bind it to a tunnel zone You must also specify an interface bound to that security zone whose IP address the unnumbered tunnel interface borrows

([DPSOH7XQQHO%RXQGWR7XQQHO,QWHUIDFH

In this example, you configure a VPN tunnel between the corporate site and a branch office The tunnel has the following characteristics:

The VPN tunnel is bound to a tunnel interface named tunnel.1.

The Untrust zone is bound to the untrust-vr, not the trust-vr

AutoKey IKE VPN using a preshared key (netscreen1), Main mode, the security level predefined as

“Compatible” for both Phase 1 and Phase 2 proposals

The interface specified as the local gateway on the corporate site is 210.1.1.1 (The branch office uses this address as the remote gateway in its IKE configuration.)

The NetScreen device at the corporate site is running ScreenOS 4.0.0

The NetScreen device at the remote site is running a version of ScreenOS earlier than 3.1.0

Note: The security zone interface that you specify must be in the same zone to which you have bound the tunnel

interface.

Note: Only the configuration for the corporate end of the tunnel is given below For information on configuring a

NetScreen device running pre-USGA ScreenOS, see the NetScreen Concepts & Examples ScreenOS Reference

Guide for the version of ScreenOS that is appropriate for your device.

Trang 7

2 Network > Interfaces > Edit (for ethernet1/2): Enter the following, and then click OK:

Zone Name: Null

3 Network > Zones > Edit (for Untrust): In the Virtual Router Name drop-down list, select untrust-vr, and then click OK.

Zone: Sales 10.1.1.1/24 eth2/1

Zone: Untrust 210.1.1.1/24 eth1/2

Branch1 10.2.1.0/24

Gateway 211.2.2.2/24 tunnel.1

Default Gateway 210.1.1.254 trust-vr Routing Domain

untrust-vr Routing Domain

VPN tunnel:

to_branch1

Note: The castle icon represents

a security zone interface.

The NetScreen device sends the encapsulated VPN traffic to the external router acting as the default gateway.

Trang 8

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

4 Network > Interfaces > Edit (for ethernet1/2): Enter the following, and then click OK:

Zone Name: Untrust

5 Network > Zones > New: Enter the following, and then click OK:

Name: SalesVirtual Router Name: trust-vr,QWHUIDFHV²=RQHVDQG7XQQHO

6 Network > Interfaces > Edit (for ethernet2/1): Enter the following, and then click OK:

Zone Name: Sales

IP Address/Netmask: 10.1.1.1/24

7 Network > Interfaces > Edit (for ethernet1/2): Enter the following, and then click OK:

Zone Name: Untrust

IP Address/Netmask: 210.1.1.1/24

8 Network > Interfaces > Tunnel IF New: Enter the following, and then click OK:

Tunnel Interface Name: tunnel.1Zone: Untrust

Unnumbered: (select)Interface: ethernet1/2(Untrust)4

4 The source interface must be in the same zone to which the tunnel interface is bound; in this case, the Untrust zone The unnumbered tunnel interface

borrows the IP address of the specified security zone interface.

Trang 9

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

931

9 VPNs > AutoKey IKE > New: Enter the following, and then click OK:

VPN Name: to_branch1Security Level: CompatibleRemote Gateway: Create a Simple Gateway: (select)Gateway Name: branch1

Type: Static IP (select), IP Address: 211.2.2.2Preshared Key: netscreen1

Security Level: CompatibleOutgoing Interface: ethernet1/25

> Advanced: Enter the following advanced settings, and then click Return to

return to the basic AutoKey IKE configuration page:

Security Level: CompatibleReplay Protection: (select)Bind to: Tunnel Interface: tunnel.1Proxy-ID: (select)

Local IP/Netmask: 10.1.1.0/24Remote IP/Netmask: 10.2.1.0/24Service: ANY

5 The outgoing interface does not have to be in the same zone to which the tunnel interface is bound.

Trang 10

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

$GGUHVVHV

10 Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: sales-any

IP Address/Domain Name:

IP/Netmask: (select), 10.1.1.0/24Zone: Sales

11 Objects > Addresses > List > New: Enter the following, and then click OK:

Address Name: branch1

IP Address/Domain Name:

IP/Netmask: (select), 10.2.1.0/24Zone: Untrust

5RXWHV

12 Network > Routing > Route Table > trust-vr New: Enter the following, and then click OK:

Network Address/Netmask: 0.0.0.0/0Next Hop Virtual Router Name: (select), untrust-vr

13 Network > Routing > Route Table > untrust-vr New: Enter the following, and then click OK:

Network Address/Netmask: 10.2.1.0/24Gateway: (select)

Interface: tunnel.1Gateway IP Address: 0.0.0.0

Trang 11

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

14 Network > Routing > Route Table > untrust-vr New: Enter the following, and then click OK:

Network Address/Netmask: 0.0.0.0/0Gateway: (select)

Interface: ethernet1/2(untrust-vr)Gateway IP Address: 210.1.1.2546

3ROLFLHV

15 Policies > (From: Sales, To: Untrust) New: Enter the following, and then click OK:

Source Address: Address Book: sales-anyDestination Address: Address Book: branch1Service: ANY

Action: PermitPosition at Top: (select)

16 Policies > (From: Untrust, To: Sales) New: Enter the following, and then click OK:

Source Address: Address Book: branch1Destination Address: Address Book: sales-anyService: ANY

Action: PermitPosition at Top: (select)

6 Setting a route to the external router designated as the default gateway is essential for both outbound VPN and network traffic In this example, the NetScreen device sends encapsulated VPN traffic to this router as the first hop along its route to the remote peer’s gateway In the illustration for this example, the concept is presented by depicting the tunnel passing through the router.

Note: Because the interface for the Sales zone (eth2/1) is in Route mode, the NetScreen device

automatically makes an entry for it in the untrust-vr route table You do not have to enter one manually.

Trang 12

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

&/,

6HFXULW\=RQHVDQG9LUWXDO5RXWHUV

1 unset interface ethernet1/2 ip

2 unset interface ethernet1/2 zone

3 set zone untrust vrouter untrust-vr

4 set zone name sales trust-vr

,QWHUIDFHV²=RQHVDQG7XQQHO

5 set interface ethernet2/1 zone sales

6 set interface ethernet2/1 ip 10.1.1.1/24

7 set interface ethernet1/2 zone untrust

8 set interface ethernet1/2 ip 210.1.1.1/24

9 set interface tunnel.1 zone untrust

10 set interface tunnel.1 ip unnumbered interface eth1/2

931

11 set ike gateway branch1 ip 211.2.2.2 outgoing-interface ethernet1/2 preshare netscreen1 sec-level

compatible

12 set vpn to_branch1 gateway branch1 replay sec-level compatible

13 set vpn to_branch1 bind interface tunnel.1

14 set vpn to_branch1 proxy-id local-ip 10.1.1.0/24 remote-ip 10.2.1.0/24 any

$GGUHVVHV

15 set address sales sales-any 10.1.1.0/24

16 set address untrust branch1 10.2.1.0/24

Trang 13

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

5RXWHV

17 set vrouter trust-vr route 0.0.0.0/0 vrouter untrust-vr

18 set vrouter untrust-vr route 10.2.1.0/24 interface tunnel.1

19 set vrouter untrust-vr route 0.0.0.0/0 interface ethernet1/2 gateway 210.1.1.254

3ROLFLHV

20 set policy top from sales to untrust sales-any branch1 any permit

21 set policy top from untrust to sales branch1 sales-any any permit

22 save

Note: Because the interface for the Sales zone (ethernet2/1) is in Route mode, the NetScreen device

automatically makes an entry for it in the untrust-vr route table You do not have to enter one manually.

Trang 14

1HW6FUHHQ&RQFHSWV ([DPSOHV²9ROXPH931V 

'HOHWLQJ7XQQHO,QWHUIDFHV

You cannot immediately delete a tunnel interface that hosts mapped IP addresses (MIPs), virtual IP addresses (VIPs), or Dynamic IP (DIP) address pools Before you delete a tunnel interface hosting any of these features, you must first delete any policies that reference them Then you must delete the MIPs, VIPs, and DIP pools on the tunnel interface Also, if a routing-based VPN configuration references a tunnel interface, you must first delete the VPN configuration before you can delete the tunnel interface

([DPSOH'HOHWLQJD7XQQHO,QWHUIDFH

In this example, tunnel interface tunnel.2 is linked to DIP pool 8 DIP pool 8 is referenced in a policy (ID 10) for VPN traffic from the Trust zone to the Untrust zone To remove the tunnel interface, you must first remove the policy (or remove the reference to DIP pool 8 from the policy), then the DIP pool, and then the interface

:HE8,

1 Policies (From: Trust, To: Untrust): Click Remove for Policy ID 10.

2 Network > Interfaces > Edit (for tunnel.2) > DIP: Click Remove for DIP ID 8.

3 Network > Interfaces: Click Remove for tunnel.2

&/,

1 unset policy 10

2 unset interface tunnel.2 dip 8

3 unset interface tunnel.2

Ngày đăng: 14/08/2014, 18:22

TỪ KHÓA LIÊN QUAN

w