{"id":5406,"date":"2018-01-09T13:40:58","date_gmt":"2018-01-09T11:40:58","guid":{"rendered":"http:\/\/skeletor.org.ua\/?p=5406"},"modified":"2018-01-09T16:53:31","modified_gmt":"2018-01-09T14:53:31","slug":"juniper-srx-550-vpn-pulse-secure-ldap-auth","status":"publish","type":"post","link":"https:\/\/skeletor.org.ua\/?p=5406","title":{"rendered":"[Juniper] SRX 550: VPN (Pulse Secure) + LDAP auth"},"content":{"rendered":"<p><span style=\"color: #ff0000;\"><strong>Step 1. Configure Dynamic VPN Users and IP Address Pool<\/strong><\/span><\/p>\n<p><code>set access profile Dynamic-XAuth client Jed firewall-user password P@ssw0rd<br \/>\nset access profile Dynamic-XAuth address-assignment pool Dynamic-VPN-Pool<br \/>\nset access address-assignment pool Dynamic-VPN-Pool family inet network 10.14.0.0\/24<br \/>\nset access address-assignment pool Dynamic-VPN-Pool family inet xauth-attributes primary-dns 10.0.0.10\/32<br \/>\nset access firewall-authentication web-authentication default-profile Dynamic-XAuth<\/code><\/p>\n<p><!--more--><\/p>\n<p><strong><span style=\"color: #ff0000;\">Step 2. Configure IPSec Phase 1<\/span><\/strong><\/p>\n<p><code>set security ike proposal Dynamic-VPN-P1-Proposal description \"Dynamic P1 Proposal\"<br \/>\nset security ike proposal Dynamic-VPN-P1-Proposal authentication-method pre-shared-keys<br \/>\nset security ike proposal Dynamic-VPN-P1-Proposal dh-group group2<br \/>\nset security ike proposal Dynamic-VPN-P1-Proposal authentication-algorithm sha1<br \/>\nset security ike proposal Dynamic-VPN-P1-Proposal encryption-algorithm 3des-cbc<br \/>\nset security ike proposal Dynamic-VPN-P1-Proposal lifetime-seconds 1200<br \/>\nset security ike policy Dynamic-VPN-P2-Policy mode aggressive<br \/>\nset security ike policy Dynamic-VPN-P2-Policy description \"Dynamic P2 Policy\"<br \/>\nset security ike policy Dynamic-VPN-P2-Policy proposals Dynamic-VPN-P1-Proposal<br \/>\nset security ike policy Dynamic-VPN-P2-Policy pre-shared-key ascii-text test@123<br \/>\nset security ike gateway Dynamic-VPN-P1-Gateway ike-policy Dynamic-VPN-P2-Policy<br \/>\nset security ike gateway Dynamic-VPN-P1-Gateway dynamic hostname vpn.domain.com<br \/>\nset security ike gateway Dynamic-VPN-P1-Gateway dynamic ike-user-type shared-ike-id<br \/>\nset security ike gateway Dynamic-VPN-P1-Gateway external-interface ge-0\/0\/0.0<br \/>\nset security ike gateway Dynamic-VPN-P1-Gateway xauth access-profile Dynamic-XAuth<\/code><\/p>\n<p><strong><span style=\"color: #ff0000;\">Step 3. Configure IPSec Phase 2<\/span><\/strong><\/p>\n<p><code>set security ipsec proposal Dynamic-P2-Proposal description Dynamic-VPN-P2-Proposal<br \/>\nset security ipsec proposal Dynamic-P2-Proposal protocol esp<br \/>\nset security ipsec proposal Dynamic-P2-Proposal authentication-algorithm hmac-sha1-96<br \/>\nset security ipsec proposal Dynamic-P2-Proposal encryption-algorithm aes-256-cbc<br \/>\nset security ipsec proposal Dynamic-P2-Proposal lifetime-seconds 3600<br \/>\nset security ipsec policy Dynamic-P2-Policy perfect-forward-secrecy keys group5<br \/>\nset security ipsec policy Dynamic-P2-Policy proposals Dynamic-P2-Proposal<br \/>\nset security ipsec vpn Dynamic-VPN ike gateway Dynamic-VPN-P1-Gateway<br \/>\nset security ipsec vpn Dynamic-VPN ike ipsec-policy Dynamic-P2-Policy<br \/>\nset security ipsec vpn Dynamic-VPN establish-tunnels immediately<\/code><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Step 4. Configure Dynamic VPN Parameters<\/strong><\/span><\/p>\n<p><code>set security dynamic-vpn force-upgrade<br \/>\nset security dynamic-vpn access-profile Dynamic-XAuth<br \/>\nset security dynamic-vpn clients all remote-protected-resources AA.AA.AA.AA\/27 BB.BB.BB.BB\/28<br \/>\nset security dynamic-vpn clients all remote-exceptions 0.0.0.0\/0<br \/>\nset security dynamic-vpn clients all ipsec-vpn Dynamic-VPN<br \/>\nset security dynamic-vpn clients all user Jed<br \/>\nset security dynamic-vpn clients all remote-protected-resources AA.AA.AA.AA\/27<br \/>\nset security dynamic-vpn clients all remote-protected-resources BB.BB.BB.BB\/28<\/code><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Step 5. Configured NAT<\/strong><\/span><\/p>\n<p><code>set security nat source rule-set VPN_NAT from zone untrust<br \/>\nset security nat source rule-set VPN_NAT to zone [ untrust trust ]<br \/>\nset security nat source rule-set VPN_NAT rule r1 match source-address 10.14.0.0\/24<br \/>\nset security nat source rule-set VPN_NAT rule r1 match destination-address [ AA.AA.AA.AA\/27 BB.BB.BB.BB\/28 ]<br \/>\nset security nat source rule-set VPN_NAT rule r1 then source-nat interface<\/code><\/p>\n<p><span style=\"color: #ff6600;\"><em><strong>\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u043d\u0438\u0435.<\/strong><\/em><\/span><\/p>\n<p>\u0412\u00a0<strong>destination-address<\/strong> \u043d\u0435\u043b\u044c\u0437\u044f \u0443\u043a\u0430\u0437\u0430\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 8 \u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439. \u0415\u0441\u043b\u0438 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0431\u043e\u043b\u044c\u0448\u0435, \u0442\u043e\u0433\u0434\u0430 \u0441\u043e\u0437\u0434\u0430\u0451\u043c \u0435\u0449\u0451 \u043f\u0440\u0430\u0432\u0438\u043b\u043e (<strong>set security &#8230; VPN_NAT rule r2&#8230;<\/strong>) \u0441 \u0442\u0435\u043c\u0438 \u0436\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438, \u043d\u043e \u0441 \u043d\u0443\u0436\u043d\u044b\u043c <strong>destination-address<\/strong>.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Step 6. Configured allowed policy<\/strong><\/span><\/p>\n<p><code>set security address-book global address VPN_NET 10.14.0.0\/24<br \/>\nset security address-book global address AA_NET01 AA.AA.AA.AA\/27<br \/>\nset security address-book global address BB_NET02 BB.BB.BB.BB\/28<br \/>\nset security policies from-zone untrust to-zone untrust policy untrust-to-untrust match source-address VPN_NET<br \/>\nset security policies from-zone untrust to-zone untrust policy untrust-to-untrust match destination-address [ AA_NET01 BB_NET02 ]<br \/>\nset security policies from-zone untrust to-zone untrust policy untrust-to-untrust match application any<br \/>\nset security policies from-zone untrust to-zone untrust policy untrust-to-untrust then permit<\/code><\/p>\n<p><span style=\"color: #ff0000;\"><strong>Step 7. Verifying IPSec Connection<\/strong><\/span><\/p>\n<p><code>root@SRX240&gt; show security dynamic-vpn users<br \/>\nroot@SRX240&gt; show security dynamic-vpn client version<br \/>\nroot@SRX240&gt; show security ike active-peer<br \/>\nroot@SRX240&gt; show security ike security-associations<br \/>\nroot@SRX240&gt; show security ipsec security-associations<br \/>\nroot@SRX240&gt; show security flow session source-prefix 10.14.0.0\/24<\/code><\/p>\n<p>\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0432\u0437\u044f\u0442\u0430 \u0441\u00a0http:\/\/www.mustbegeek.com\/configure-dynamic-remote-access-vpn-in-juniper-srx\/ \u0441 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f\u043c\u0438.<\/p>\n<p>\u0414\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043a\u043b\u0438\u0435\u043d\u0442 <strong>Pulse Secure<\/strong>, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u0430\u0447\u0430\u0442\u044c \u043b\u0438\u0431\u043e \u0441 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0441\u0430\u0439\u0442\u0430 \u043b\u0438\u0431\u043e \u043f\u0440\u044f\u043c\u043e \u0438\u0437 web-\u043c\u043e\u0440\u0434\u044b SRX&#8217;a<\/p>\n<p><span style=\"color: #ff0000;\"><strong>Step 8. LDAP AUTH<\/strong><\/span><\/p>\n<p>\u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e \u0443 \u043c\u0435\u043d\u044f \u043a\u0430\u043a \u0440\u0430\u0437 \u0432\u0435\u0440\u0441\u0438\u044f<\/p>\n<p><code>&gt;show system software<br \/>\nInformation for junos:<br \/>\nComment:<br \/>\nJUNOS Software Release [12.1X44-D20.3]<\/code><\/p>\n<p>[SRX] LDAP authentication not working with Dynamic VPN (https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=KB19869)<\/p>\n<p><strong>SUMMARY:<\/strong><\/p>\n<div class=\"content nonfileattachment\">\n<p>Unable to integrate LDAP authentication with Dynamic VPN<\/p>\n<\/div>\n<p><strong>SYMPTOMS:<\/strong><\/p>\n<div class=\"content nonfileattachment\">\n<p>Dynamic VPN XAuth is not working when external LDAP server is used.<\/p>\n<p>This applies to SRX platforms (SRX100, SRX210, SRX240, SRX650) and with the following versions of Junos:<\/p>\n<ul>\n<li>Junos 9.6 (SRX210, SRX240)<\/li>\n<li>Junos 10.0 (SRX100)<\/li>\n<li>Junos 10.2 (SRX650)<\/li>\n<\/ul>\n<\/div>\n<p><strong>SOLUTION:<\/strong><\/p>\n<div class=\"content nonfileattachment\">\n<p><strong>UPDATE:<\/strong><\/p>\n<p>Junos OS 12.1X45 and above:<br \/>\nLDAP authentication can be used with Dynamic VPN and group based authentication for LDAP is supported. For an example, see <a href=\"http:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=KB21978\" target=\"_blank\" rel=\"noopener\">KB21978 &#8211; [SRX] Dynamic VPN XAUTH using LDAP<\/a>.<br \/>\nWith Junos OS 12.1X44 and below, integration of LDAP authentication in Xauth for Dynamic VPN is not supported.<\/p>\n<p>An external RADIUS server is required and recommended for XAuth and to provide an IP address for the virtual adapter installed on the client PC. Only an external RADIUS server is supported and recommended for XAuth while implementing Dynamic VPN.<\/p>\n<\/div>\n<p>https:\/\/kb.juniper.net\/InfoCenter\/index?page=content&#038;id=KB19869<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Step 1. Configure Dynamic VPN Users and IP Address Pool set access profile Dynamic-XAuth client Jed firewall-user password P@ssw0rd set access profile Dynamic-XAuth address-assignment pool Dynamic-VPN-Pool set access address-assignment pool Dynamic-VPN-Pool family inet network 10.14.0.0\/24 set access address-assignment pool Dynamic-VPN-Pool family inet xauth-attributes primary-dns 10.0.0.10\/32 set access firewall-authentication web-authentication default-profile Dynamic-XAuth<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-5406","post","type-post","status-publish","format-standard","hentry","category-juniper"],"_links":{"self":[{"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/posts\/5406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5406"}],"version-history":[{"count":8,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/posts\/5406\/revisions"}],"predecessor-version":[{"id":5414,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=\/wp\/v2\/posts\/5406\/revisions\/5414"}],"wp:attachment":[{"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skeletor.org.ua\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}