0% found this document useful (0 votes)
110 views5 pages

VPN Juniper-Forti

The document describes the configuration of a Juniper VPN network. It specifies the VPN gateway and IP address, IKE and IPsec proposals using DES encryption, MD5 authentication and DH group 5. It configures an IPsec VPN between the WAN interface and a security zone for the VPN tunnel, and defines policies to permit traffic between the trust and VPN zones in both directions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views5 pages

VPN Juniper-Forti

The document describes the configuration of a Juniper VPN network. It specifies the VPN gateway and IP address, IKE and IPsec proposals using DES encryption, MD5 authentication and DH group 5. It configures an IPsec VPN between the WAN interface and a security zone for the VPN tunnel, and defines policies to permit traffic between the trust and VPN zones in both directions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

VPN

Name Juniper VPN


Network
IP Version IPv4
Remote Gateway Static IP Address
IP Address 192.168.1.200
Interface WAN (port1)
Local Gateway <disable>
Mode Config <disable>
NAT Transversal Enable
Keepalive Frecuency 10
Dead Peer Detection Disable
Authentication
Method Pre-shared Key
Pre-shared Key ******
IKE
Version 1
Mode Main(ID protection)

Phase 1 Proposal
Encription DES
Authentication MD5
Diffie Hellman Group 5
Key Lifetime (Seconds) 86400
Lolca ID 192.168.1.201

XAUTH
Type Disabled
Routing

Policies
JUNIPER

=======

IKE

set security ike proposal prop-ike-forti authentication-method pre-shared-keys

set security ike proposal prop-ike-forti dh-group group5

set security ike proposal prop-ike-forti authentication-algorithm md5

set security ike proposal prop-ike-forti encryption-algorithm des-cbc

set security ike proposal prop-ike-forti lifetime-seconds 86400

set security ike policy pol-ike-forti mode main

set security ike policy pol-ike-forti proposals prop-ike-forti

set security ike policy pol-ike-forti pre-shared-key ascii-text "$9$azGkPfT3tu1zFcyKvLX"

set security ike gateway gw-ike-forti ike-policy pol-ike-forti

set security ike gateway gw-ike-forti address 192.168.1.201

set security ike gateway gw-ike-forti external-interface ge-0/0/0.0

set security ike gateway gw-ike-forti general-ikeid

set security ike gateway gw-ike-forti version v1-only

IPSEC

set security ipsec proposal prop-ipsec-forti protocol esp

set security ipsec proposal prop-ipsec-forti authentication-algorithm hmac-md5-96

set security ipsec proposal prop-ipsec-forti encryption-algorithm des-cbc

set security ipsec proposal prop-ipsec-forti lifetime-seconds 1800

set security ipsec policy pol-ipsec-forti perfect-forward-secrecy keys group5

set security ipsec policy pol-ipsec-forti proposals prop-ipsec-forti

set security ipsec vpn vpn-forti bind-interface st0.0

set security ipsec vpn vpn-forti ike gateway gw-ike-forti

set security ipsec vpn vpn-forti ike ipsec-policy pol-ipsec-forti

set security ipsec vpn vpn-forti establish-tunnels on-traffic

INTERFACE

set interfaces st0 unit 0 family inet


ROUTE

set routing-options static route 172.16.14.0/24 next-hop st0.0

ZONE

set security zones security-zone VPN-Zone host-inbound-traffic system-services ike

set security zones security-zone VPN-Zone host-inbound-traffic system-services ping

set security zones security-zone VPN-Zone host-inbound-traffic system-services traceroute

set security zones security-zone VPN-Zone interfaces st0.0

POLICY

set security policies from-zone trust to-zone VPN-Zone policy to_Forti match source-address
any

set security policies from-zone trust to-zone VPN-Zone policy to_Forti match destination-
address any

set security policies from-zone trust to-zone VPN-Zone policy to_Forti match application any

set security policies from-zone trust to-zone VPN-Zone policy to_Forti then permit

set security policies from-zone trust to-zone VPN-Zone policy to_Forti then log session-close

set security policies from-zone trust to-zone VPN-Zone policy to_Forti then count

set security policies from-zone VPN-Zone to-zone trust policy toJunos match source-address
any

set security policies from-zone VPN-Zone to-zone trust policy toJunos match destination-
address any

set security policies from-zone VPN-Zone to-zone trust policy toJunos match application any

set security policies from-zone VPN-Zone to-zone trust policy toJunos then permit

set security policies from-zone VPN-Zone to-zone trust policy toJunos then log session-close

set security policies from-zone VPN-Zone to-zone trust policy toJunos then count

You might also like