{"id":269,"date":"2017-08-13T17:22:15","date_gmt":"2017-08-13T21:22:15","guid":{"rendered":"http:\/\/puluka.com\/home\/?p=269"},"modified":"2017-08-13T17:22:15","modified_gmt":"2017-08-13T21:22:15","slug":"screenos-redundant-internet-connections-on-a-policy-vpn","status":"publish","type":"post","link":"http:\/\/puluka.com\/home\/networking\/screenos\/screenos-redundant-internet-connections-on-a-policy-vpn\/","title":{"rendered":"ScreenOS \u2013 Redundant Internet Connections on a Policy VPN"},"content":{"rendered":"<p><strong>Product<\/strong>: ScreenOS<br \/>\n<strong>Version<\/strong>: 6.0 and higher<\/p>\n<h2>Network Topology<\/h2>\n<p><a href=\"http:\/\/puluka.com\/home\/wp-content\/uploads\/2017\/08\/ScreenOSRedundantPolicyVPN.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-270\" src=\"http:\/\/puluka.com\/home\/wp-content\/uploads\/2017\/08\/ScreenOSRedundantPolicyVPN-300x253.jpg\" alt=\"\" width=\"300\" height=\"253\" srcset=\"http:\/\/puluka.com\/home\/wp-content\/uploads\/2017\/08\/ScreenOSRedundantPolicyVPN-300x253.jpg 300w, http:\/\/puluka.com\/home\/wp-content\/uploads\/2017\/08\/ScreenOSRedundantPolicyVPN-768x648.jpg 768w, http:\/\/puluka.com\/home\/wp-content\/uploads\/2017\/08\/ScreenOSRedundantPolicyVPN.jpg 851w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Two sites connected by VPN with one site having two internet access connections. They connect using policy based VPN.<\/p>\n<h2>Description:<\/h2>\n<p>This configuration has a redundant internet link on one side of a policy based vpn connection.\u00a0 The creation of two gateways and a group allows for failover between the two links and setting one as the priority link.<\/p>\n<ol>\n<li>Create a VPN Group<\/li>\n<li>Configure two gateways, one for each outbound interface<\/li>\n<li>Configure an AutoKey IKE for each of the gateways and select the VPN group designating the primary connection with the higher priority number.<\/li>\n<li>Configure the Policy using the VPN tunnel option and associate this with the VPN group<\/li>\n<\/ol>\n<h2>Configuration:<\/h2>\n<p><strong>1. Create VPN Group: <\/strong><\/p>\n<p>This allows the two circuits connections to be treated as a single device to the VPN tunnel policy.<\/p>\n<p>CLI<br \/>\nset vpn-group id 1<\/p>\n<p>Web<br \/>\nVPNs \u2013 AutoKey Advanced \u2013 VPN Groups<br \/>\nNew<\/p>\n<p><strong>2. Configure two Gateways<\/strong><\/p>\n<p>Create a gateway for each of the two outbound interfaces<\/p>\n<p>CLI<br \/>\nset ike gateway Primary-GW address 2.2.2.2 Main outgoing-interface &#8220;ethernet0\/0&#8221; preshare Juniper== sec-level standard<br \/>\nset ike gateway Backup-GW address 2.2.2.2 Main outgoing-interface &#8220;ethernet0\/1&#8221; preshare Juniper== sec-level standard<\/p>\n<p>Web<br \/>\nVPNs \u2013 AutoKey Advanced \u2013 Gateway<br \/>\nNew and select the correct interface for each on the advanced page<\/p>\n<p><strong>3. Configure AutoKey IKE<\/strong><\/p>\n<p>Create IPSEC object on each gateway and place into group<\/p>\n<p>CLI<br \/>\nset vpn RemotePrimary gateway Primary-GW no-replay tunnel idletime 0 sec-level standard<br \/>\nset vpn-group id 1 vpn RemotePrimary weight 10<br \/>\nset vpn RemoteSecondary gateway Primary-GW no-replay tunnel idletime 0 sec-level standard<br \/>\nset vpn-group id 1 vpn RemoteSecondary weight 1<\/p>\n<p>Web<br \/>\nVPNs \u2013 AutoKey IKE<br \/>\nNew select the correct gateway on the opening page<br \/>\nselect the group on the advanced tab and set priority (higher is Primary)<\/p>\n<p><strong>4. Configure Policy Tunnel<\/strong><\/p>\n<p>The tunnel will associate with the group and can use either circuit connection but will prefer the higher priority one first.<\/p>\n<p>CLI<br \/>\nset address Trust LocalLAN 10.0.1.0 255.255.255.0<br \/>\nset address Untrust RemoteLAN 10.0.2.0 255.255.255.0<br \/>\nset policy name RemoteVPN from Untrust to Trust LocalLAN ClinicLAN ANY tunnel vpn-group 1<br \/>\nset policy name RemoteVPN from Trust to Untrust LocalLAN RemoteLAN ANY tunnel vpn-group 1<\/p>\n<p>Web<br \/>\nPolicies \u2013 Policy Objects \u2013 Addresses \u2013 List<br \/>\nCreate Remote LAN address in Untrust zone<br \/>\nCreate Local LAN address in trust zone<br \/>\nPolicies \u2013 Policy<br \/>\nCreate trust to untrust policy and check the box to create a matching policy<br \/>\nSelect tunnel and select the VPN group<\/p>\n<h2>Verification:<\/h2>\n<p>Confirm SA is up<\/p>\n<p>CLI<br \/>\nget sa<br \/>\nWeb<br \/>\nVPNs \u2013 Monitor Status<\/p>\n<p>Disconnect the primary ethernet cable and confirm the failover occurs<\/p>\n<h2>References:<\/h2>\n<p><strong>ScreenOS Concepts and Examples Guide<\/strong><br \/>\n<a href=\"http:\/\/www.juniper.net\/techpubs\/software\/screenos\/screenos6.2.0\/index.html\">http:\/\/www.juniper.net\/techpubs\/software\/screenos\/screenos6.2.0\/index.html<\/a><\/p>\n<h3>Route based VPN tunnels<\/h3>\n<p>Concepts &amp; Examples Guide<br \/>\nVolume 5 Virtual Private Networks<br \/>\nChapter 3 VPN Guidelines<br \/>\nChapter 4 VPN: Sit-to-site VPN Configurations<\/p>\n<p>Originally Posted June 04, 2011<br \/>\nLast Revised on June 04, 2011 <a name=\"commentsAnchor\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Product: ScreenOS Version: 6.0 and higher Network Topology Two sites connected by VPN with one site having two internet access connections. They connect using policy based VPN. Description: This configuration has a redundant internet link [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-269","post","type-post","status-publish","format-standard","hentry","category-screenos"],"_links":{"self":[{"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/posts\/269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":2,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/posts\/269\/revisions"}],"predecessor-version":[{"id":1258,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/posts\/269\/revisions\/1258"}],"wp:attachment":[{"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/media?parent=269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/categories?post=269"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/puluka.com\/home\/wp-json\/wp\/v2\/tags?post=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}