Virtual Private Networks
Total Page:16
File Type:pdf, Size:1020Kb
Concepts & Examples ScreenOS Reference Guide Virtual Private Networks Release 6.3.0, Rev. 02 Published: 2012-12-10 Revision 02 Copyright © 2012, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JunosE is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2009, Juniper Networks, Inc. All rights reserved. Revision History December 2012—Revision 02 Content subject to change. The information in this document is current as of the date listed in the revision history. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you indicate that you understand and agree to be bound by those terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the software and may contain prohibitions against certain uses. The software license may state conditions under which the license is automatically terminated. You should consult the license for further details. For complete product documentation, please see the Juniper Networks Website at www.juniper.net/techpubs. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions of that EULA. ii Copyright © 2012, Juniper Networks, Inc. Abbreviated Table of Contents About This Guide . xvii Part 1 Virtual Private Networks Chapter 1 Internet Protocol Security . 3 Chapter 2 Public Key Cryptography . 35 Chapter 3 Virtual Private Network Guidelines . 61 Chapter 4 Site-to-Site Virtual Private Networks . 91 Chapter 5 Dialup Virtual Private Networks . 169 Chapter 6 Layer 2 Tunneling Protocol . 213 Chapter 7 Advanced Virtual Private Network Features . 241 Chapter 8 AutoConnect-Virtual Private Networks . 331 Part 2 Index Index . 361 Copyright © 2012, Juniper Networks, Inc. iii Virtual Private Networks iv Copyright © 2012, Juniper Networks, Inc. Table of Contents About This Guide . xvii Document Conventions . xviii Document Feedback . xx Requesting Technical Support . xx Part 1 Virtual Private Networks Chapter 1 Internet Protocol Security . 3 Introduction to Virtual Private Networks . 3 IPsec Concepts . 4 Modes . 5 Transport Mode . 5 Tunnel Mode . 6 Protocols . 7 Authentication Header . 7 Encapsulating Security Payload . 8 Key Management . 9 Manual Key . 9 AutoKey IKE . 9 Key Protection . 10 Security Associations . 10 Tunnel Negotiation . 11 Phase 1 . 11 Main and Aggressive Modes . 12 Diffie-Hellman Exchange . 13 Elliptical Curve Diffie-Hellman . 13 Phase 2 . 14 Perfect Forward Secrecy . 15 Replay Protection . 15 IKE and IPsec Packets . 15 IKE Packets . 15 IPsec Packets . 18 IKE Version 2 . 20 Initial Exchanges . 20 CREATE_CHILD_SA Exchange . 26 Informational Exchanges . 26 Enabling IKEv2 on a Security Device . 26 Example: Configuring an IKEv2 Gateway . 26 Authentication Using Extensible Authentication Protocol . 30 IKEv2 EAP Passthrough . 31 Example . 31 Copyright © 2012, Juniper Networks, Inc. v Virtual Private Networks Chapter 2 Public Key Cryptography . 35 Introduction to Public Key Cryptography . 35 Signing a Certificate . 35 Verifying a Digital Signature . 36 Elliptic Curve Digital Signature Algorithm . 36 Public Key Infrastructure . 37 Certificates and CRLs . 39 Requesting a Certificate Manually . 41 WebUI . 41 CLI . 42 Loading Certificates and Certificate Revocation Lists . 43 WebUI . 44 CLI . 44 Manual Certificate Renewal . 44 Configuring CRL Settings . 45 WebUI . 45 CLI . 46 Obtaining a Local Certificate Automatically . 46 WebUI . 47 CLI . ..