Our standard architecture for private clouds includes security appliances that provide a fairly comprehensive set of security features from stateless firewall to full intrusion detection. We like to use Juniper SRX devices, and I admit I'm a big fan JunOS.
In the same vein as this post by Thomas, a client wished to use a Linux system to connect to their SRX-powerd IPSec VPN using the Shrew Soft client. Searching the tubes for other people's experience connecting these two end points yielded... nothing. But after some poking and prodding, I got the client to connect. The main elements of the configuration that weren't immediately obvious were:
- Use "push" configuration mode
- Manually add the policies needed for the given VPN
I find the configuration modes are always named differently from one client to another -- Shrew Soft has push, pull, and dhcp; VPN Tracker has mode config, mode config (active), and mode config (passive); &c. Standard terminology would definitely simplify cross-vendor integrations. I would have liked to have this VPN client pulling the network policies from the SRX. VPN Tracker is able to do this, and the Shrew Soft client has a configuration option for this, but it didn't work in my test setup. Below is the complete client configuration. The test node was a Debian 6 VM, extra stuff beyond the base install was added just to build the client (2.1.7, current at the time of writing).
b:auth-mutual-psk:eA== n:client-addr-auto:1 n:client-banner-enable:1 n:client-dns-auto:1 n:client-dns-used:1 n:network-dpd-enable:1 n:network-frag-size:540 n:network-ike-port:500 n:network-mtu-size:1380 n:network-natt-port:4500 n:network-natt-rate:60 n:network-notify-enable:1 n:phase1-dhgroup:2 n:phase1-keylen:256 n:phase1-life-kbytes:0 n:phase1-life-secs:28800 n:phase2-keylen:256 n:phase2-life-kbytes:0 n:phase2-life-secs:3600 n:phase2-pfsgroup:2 n:policy-list-auto:0 n:policy-nailed:1 n:vendor-chkpt-enable:0 n:version:2 s:client-ip-addr:0.0.0.0 s:client-ip-mask:255.255.255.255 s:client-dns-addr:18.104.22.168 s:client-dns-suffix: s:network-host:vpn.example.com s:client-auto-mode:push s:client-iface:virtual s:network-natt-mode:enable s:network-frag-mode:enable s:auth-method:mutual-psk-xauth s:ident-client-type:fqdn s:ident-client-data:vpn.example.com s:ident-server-type:address s:phase1-exchange:aggressive s:phase1-cipher:aes s:phase1-hash:sha1 s:phase2-transform:aes s:phase2-hmac:sha1 s:ipcomp-transform:disabled s:policy-level:auto s:policy-list-include:10.10.10.0 / 255.255.255.0
I'm excited to announce a new position here at Redux for the role of a Drupal Architect.
Just what is a Drupal Architect?
- A contributor to the Drupal community through code or user assistance.
- A Drupal developer who has been exposed to business critical Drupal stacks.
- An architect assisting in the ongoing evolution of our Enterprise Drupal Stack.
- One who is willing to evangelize within the Drupal community.
This is a full time position based in our Portland, Oregon headquarters.
If you fit the role of a Drupal Architect please send your resumes to firstname.lastname@example.org.
How fast is Drupal on a Network Redux Enterprise Virtual Server? Our clients know. Now we'd like the industry to know.
We are opening up ten (10) slots for ten new client/companies to submit a request for a Drupal Optimized platform on our Enterprise Virtual Server platform. This is a first come first serve basis and the first year is free. You may use this for personal or non-profit or corporate purposes, no strings attached.
- Datacenter: Internap Seattle (SEF003)
- Carriers: (9) 10Gbps / MIRO
- Routing Platform: Juniper MX
- Switching Platform: Force10 C Series
- Hypervisor: Citrix XenServer Enterprise Edition
- Guest OS: Ubuntu 10 LTS
- Userland: Our own brew
- Dedicated Processor: (1) 2.8Ghz Xeon Core
- Dedicated Memory: 2048MB
- Dedicated SAS-15K SAN Storage: 24GB
And fully managed by our team of software engineers and system architects.
Ready to try one out at no cost for the first year? Send us your request to email@example.com and we'll take the first ten inquiries from those of you who are looking to enhance your drupal hosting experience.
UPDATE We've received a lot of interest, but were out of our 10 slots! You can still get the Drupal stack on our normal EVS plans by emailing: firstname.lastname@example.org
(January 23, 2012, Posted in General News )
Last week we deployed a couple of updates to the Dashboard for Virtual Server customers. First off, you can now completely reset your VM back to it's original state. Note: This is not reversable.
You can access this feature by clicking on "Manage" next to your VM, and then clicking "Reset VM".
We also updated our Server Images, and you can now order Centos 6!
I wish this article had been published prior to engaging our first series of SRX units. Over the last couple of months weve actively deployed close to (20) SRX 240 units, primarily in active/passive chassis clusters.
Quite a few of our customers rely on VPN connectivity to manage their private clouds. Quite a few of our clients are also Mac shops, similar to our organization.
A popular, yet expensive VPN client is made by our friends at Equinux called VPN Tracker. This is without question the most powerful and robust VPN client Ive ever seen on any platform be it Mac, Windows or Linux.
That being said, during a transition from Watchguard to Juniper as our Security gateway provider (and Force10 to Juniper MX for Routing) a poor assumption made on our part was that the SRX series was supported out of the box by VPN Tracker. This article is being written because it was, and currently is not supported.
For anyone following the Juniper Security track, it is clear from the writers of JunOS Security by OReilly that the SRX is being geared to replace the Netscreen and SSG families. ScreenOS will be no more, JunOS is the future for security at Juniper.
Through a combination of many resources including but not limited to Juniper TAC, a third party site to site (not dynamic VPN) windows based IPSec client (which had documented support by JunOS) and a great deal of troubleshooting I was able to engineer a working configuration for IPSec connectivity from VPN Tracker to an SRX endpoint.
Lets start by saying the standard proposal set should not be used. This was my first glimmer into not using default sets within JunOS. This essentially predefines a set of criteria to be used for the proposal to have a conversation and engage with the endpoint. Specifically:
standard - Standard set of two set of IKE proposals: Proposal 1 Preshared key, 3DES encryption, and Diffie-Hellman Group 2 and SHA-1 authentication. Proposal 2Preshared key, Advanced Encryption Standard (AES) 128-bit encryption, and Diffie-Hellman Group 2 and SHA-1 authentication.
Despite all efforts we could not engage in a Proposal 1 agreement within VPN Tracker, initial theory is on the Triple DES encryption. What follows is a documented and working proposal set to use for your Dynamic VPN IPSec configurations within JunOS:
set security zones security-zone Public interfaces ge-X/X/X.X host-inbound-traffic system-services ike set security ike proposal PSK-AES128-SHA1-DH2 authentication-method pre-shared-keys set security ike proposal PSK-AES128-SHA1-DH2 dh-group group2 set security ike proposal PSK-AES128-SHA1-DH2 authentication-algorithm sha1 set security ike proposal PSK-AES128-SHA1-DH2 encryption-algorithm aes-128-cbc set security ike proposal PSK-AES128-SHA1-DH2 lifetime-seconds 28800 set security ike proposal PSK-AES256-SHA1-DH2 authentication-method pre-shared-keys set security ike proposal PSK-AES256-SHA1-DH2 dh-group group2 set security ike proposal PSK-AES256-SHA1-DH2 authentication-algorithm sha1 set security ike proposal PSK-AES256-SHA1-DH2 encryption-algorithm aes-256-cbc set security ike proposal PSK-AES256-SHA1-DH2 lifetime-seconds 28800 set security ike policy ike-dyn-vpn-policy mode aggressive set security ike policy ike-dyn-vpn-policy proposals PSK-AES128-SHA1-DH2 set security ike policy ike-dyn-vpn-policy proposals PSK-AES256-SHA1-DH2 set security ike policy ike-dyn-vpn-policy pre-shared-key ascii-text "XXXX" set security ike gateway dyn-vpn-local-gw ike-policy ike-dyn-vpn-policy set security ike gateway dyn-vpn-local-gw dynamic hostname reduxftw set security ike gateway dyn-vpn-local-gw dynamic connections-limit 10 set security ike gateway dyn-vpn-local-gw dynamic ike-user-type shared-ike-id set security ike gateway dyn-vpn-local-gw external-interface ge-X/X/X.X set security ike gateway dyn-vpn-local-gw xauth access-profile dyn-vpn-access-profile set security ipsec proposal ESP-AES128-SHA protocol esp set security ipsec proposal ESP-AES128-SHA authentication-algorithm hmac-sha1-96 set security ipsec proposal ESP-AES128-SHA encryption-algorithm aes-128-cbc set security ipsec proposal ESP-AES128-SHA lifetime-seconds 28800 set security ipsec proposal ESP-AES256-SHA protocol esp set security ipsec proposal ESP-AES256-SHA authentication-algorithm hmac-sha1-96 set security ipsec proposal ESP-AES256-SHA encryption-algorithm aes-256-cbc set security ipsec proposal ESP-AES256-SHA lifetime-seconds 28800 set security ipsec policy ipsec-dyn-vpn-policy perfect-forward-secrecy keys group2 set security ipsec policy ipsec-dyn-vpn-policy proposals ESP-AES128-SHA set security ipsec policy ipsec-dyn-vpn-policy proposals ESP-AES256-SHA set security ipsec vpn dyn-vpn ike gateway dyn-vpn-local-gw set security ipsec vpn dyn-vpn ike ipsec-policy ipsec-dyn-vpn-policy
Pretty basic configuration, fill in the Xs where needed and youve got viable usage of AES128 or 256.
On the VPN Tracker side simply create a custom profile and fill in your phase 1 and phase 2 settings as appropriate.
Also, dont forget to insert your Public_Bound source bound natting in front of your last resort source-address with source-nat off.
Lastly, remember that security policies in JunOS flow downward. Ensure your security policy to handle this traffic is in front of any-permit.
Hopefully this helps the next engineer working with similar platforms.
Any questions, I'm email@example.com. Cheers.