Create an VPN Connection with a Juniper Netscreen 5GT (Part 1)
I created this post because I really hate the juniper site with their links to other documents instead of displaying the whole document all together.
To configure an L2TP over IPSec tunnel, perform the following steps:
Configure an L2TP over IPSec user on the Juniper Firewall. For more information on configuring an L2TP over IPSec user, go to Configuring an L2TP over IPSec User on the Juniper Firewall.
Configure an L2TP user group on the Juniper Firewall. For more information on configuring an L2TP user group, go to Configuring an L2TP User Group on the Juniper Firewall.
Configure an L2TP group gateway on the Juniper Firewall. For more information on configuring an L2TP group gateway, go to Configuring an L2TP Group Gateway and VPN on the Juniper Firewall.
Configure an L2TP IP pool on the Juniper Firewall. For more information on configuring an L2TP IP pool, go to Configuring an L2TP IP Pool on the Juniper Firewall.
Configure the L2TP VPN default settings on the Juniper Firewall. For more information on configuring the L2TP VPN default settings, go to Configuring the L2TP VPN Default Settings on the Juniper Firewall.
Configure an L2TP VPN tunnel on the Juniper Firewall. For more information on configuring the L2TP VPN tunnel, go to Configuring the L2TP VPN Tunnel on the Juniper Firewall.
Configure an L2TP VPN policy on the Juniper Firewall. For more information on configuring the L2TP VPN policy, go to Configuring an L2TP VPN Policy on the Juniper Firewall.
Configure an L2TP Connection on the Remote Side. For more information on configuring an L2TP connection on the remote side, go to Configuring an L2TP Connection on the Remote Side.
Make an L2TP Connection from Windows 2000. For more information on making an L2TP connection from Windows 2000, go to Making an L2TP Connection from Windows 2000.
To make an L2TP connection using Windows 2000, perform the following steps:
From the Start menu, select Settings, select Network and Dial-up Connections, and then click Make New Connection.
From the Network Connection Wizard, click Next.
From Network Connection Type, click to select Connect to a private network through the Internet, and then click Next.
From Public Network, click to select the dial-up connection that connects you to your ISP. If your physical connection is an Ethernet connection, select Do not dial initial connection. If the physical connection is through an ISP, select Automatically dial this initial connection. Click Next.
For this example, we used Do not dial the initial connection.
From Destination Address, in the Host name or IP address box, enter the IP address or hostname of your Juniper Firewall's Untrust interface, and then click Next.
For this example, we have used 1.1.1.1 as the Untrust IP address.
From Connection Availability, click to select For all users, and then click Next.
From the Completing the Network Connection Wizard, enter a connection name, and then click Finish.
Click to select the Security tab, click to select Advanced (custom settings), and then click Settings.
From Advanced Security Settings, from the Data encryption drop-down menu, click to select Optional encryption (connect even if no encryption).
From Logon security, click to select Allow these protocols. Click to select only Unencrypted password (PAP) and Challenge Handshake Authentication Protocol (CHAP). Click to clear any protocols that do not apply.
Click to select the Networking tab. From the Type of VPN server I am calling drop-down menu, click to select Layer-2 Tunneling Protocol (L2TP).
From Network and Dial-up Connections, double-click the Dial-up Connection.
Enter your User name and Password.
The User name and Password matches the username and password of the L2TP user configured on the Firewall.
To configure an L2TP user group on the Juniper Firewall, perform the following steps:
Open the WebUI. For an example of how to access the WebUI, consult: KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI
From the ScreenOS options menu, click Objects, select User Group, and then click Local.
From the Edits screen, enter a Group Name.
For this example, we have entered usergroup1.
Click to select an Available Member, and then click the Add Group Members button.
For this example, we have selected John Doe.
For more information on configuring an L2TP user, go to Configuring an L2TP User on the Juniper Firewall.
Click OK.
To configure an L2TP group gateway and VPN on the Juniper Firewall, perform the following steps:
Open the WebUI. For an example of how to access the WebUI, consult: KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI
From the ScreenOS options menu, click VPNs, select AutoKey Advanced, and then click Gateway.
From the Edit screen, enter a Gateway Name. From Security Level, click Custom.
For this example, we entered JohnDoeGate.
From Remote Gateway Type, click to select Dialup User Group. From the Group drop-down menu, click to select your group.
For this example, we selected usergroup1.
From the Preshared Key text box, enter a Preshared Key.
For this example, we have entered Password9.
From Outgoing Interface, click to select untrust. Click Advanced.
From Phase 1 Proposal drop-down menu, click to choose a proposal.
For this example, we chose pre-g2-des-sha. When choosing the Phase 1 Proposal, you must select pre for the proposal.
From Mode (Initiator), click to select Aggressive.
Click Return.
From the ScreenOS options menu, click VPNs, select AutoKey IKE.
From VPN Name, enter a VPN Name. Click to select Custom.
For this example, we entered JohnDoeIke.
From the Remote Gateway drop-down menu, click to select a Remote Gateway.
For this example, we chose JohnDoeGate.
Click Advanced.
From User Defined, click to select Custom. From the Phase 2 Proposal drop-down menus, click to choose the Phase 2 Proposal settings.
For this example, we chose nopfs-esp-des-md5, nopfs-esp-3des-md5, nopfs-esp-des-sha, and nopfs-esp-3des-sha.
From Transport Mode, click (For L2TP-over-IPSec only). From Bind to, click None.
Click Return.
To configure an L2TP IP pool on the Juniper Firewall, perform the following steps:
Open the WebUI. For an example of how to access the WebUI, consult: KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI
From the ScreenOS options menu, click Objects, and then click IP Pools.
From the Edit screen, enter an IP Pool Name, a Start IP, and an End IP.
For this example, we have chosen an IP Pool Name of global, a Start IP of 10.10.2.100, and an End IP of 10.10.2.180.
To avoid potential routing problems, make sure the IP Pool is on a different IP Subnet than the Trust Zone.
To configure the L2TP VPN default settings on the Juniper Firewall, perform the following steps:
If L2TP/Xauth Remote settings are not configured, the L2TP VPN default settings will be used. For more information on configuring an L2TP over IPSec user, go to Configuring an L2TP over IPSec user on the Juniper Firewall.
Open the WebUI. For an example of how to access the WebUI, consult: KB4060 - Accessing Your NetScreen, SSG, or ISG Firewall Using the WebUI
From the ScreenOS options menu, click VPNs, select L2TP, and then click Default Settings.
From the Default Settings screen, from the IP Pool Name drop-down menu, click to select global, and then from the PPP Authentication drop-down menu, click to select CHAP.
For more information on configuring an L2TP IP pool, go to Configuring an L2TP IP Pool on the Juniper Firewall.
DNS Primary Server IP, and DNS Secondary Server IP values are optional, and are not required for the L2TP tunnel to work. If DNS settings are set, they will be pushed down to the L2TP PC client.
For this example, for the DNS Primary Server IP, we have entered 210.11.40.3, and for the DNS Secondary Server IP, we have entered 210.11.50.2.
Click Apply.
Comments