IPsec VPN Overview
IPsec VPN provides a means to securely communicate with remote computers across a public WAN such as the Internet. A VPN connection can link two LANs using a site-to-site VPN or a remote dial-up user and a LAN. The traffic that flows between these two points passes through shared resources such as routers, switches, and other network equipment that comprise the public WAN. To secure VPN communication that passes through the WAN, you need to create an IPsec tunnel.
Juniper Security Director Cloud simplifies the management and deployment of IPsec VPNs. In general, VPN configurations are tedious and repetitive when deploying over a large number of SRX Series Firewalls. With Juniper Security Director Cloud, you can use VPN profiles to group common settings and apply the profiles to multiple VPN tunnel configurations across multiple SRX Series Firewalls. You can deploy site-to-site and hub-and-spoke VPNs. Juniper Security Director Cloud determines the necessary deployment scenarios and publishes the required configuration for all SRX Series Firewalls.
Juniper Security Director Cloud supports policy-based and route-based IPsec VPNs on SRX Series Firewalls. Policy-based VPNs are supported only in the site-to-site deployments, where you configure two endpoints. If you have two or more SRX Series Firewalls, then route-based VPNs offer more flexibility and scalability. To allow data to be securely transferred between a branch office and the corporate office, configure a policy-based or route-based IPsec VPN. For an enterprise-class deployment, configure a hub-and-spoke IPsec VPN.
Use route-based tunnel mode if:
Participating gateways are Juniper Networks products.
Either source or destination NAT must occur when traffic traverses the VPN.
Dynamic routing protocols must be used for VPN routing.
Primary and backup VPNs are required in the setup.
Use policy-based tunnel mode if:
-
The remote VPN gateway is a non-Juniper Networks device.
-
Access to the VPN must be restricted for specific application traffic.
When you create a policy-based or route-based IPsec VPN, a topology is displayed for a representation. You need to click the icons to configure the remote gateway.
Juniper Security Director Cloud views each logical system as any other security device and takes ownership of the security configuration of the logical system. In Juniper Security Director Cloud, each logical system is managed as a unique security device.
Juniper Security Director Cloud ensures that the tunnel interfaces are exclusively assigned to the individual logical systems of a device. No tunnel interface is assigned to more than one logical system of the same device.
Juniper Security Director Cloud does not support VPN over Point-to-Point Protocol over Ethernet (PPPoE).
IPsec VPN Topologies
The following IPsec VPNs are supported:
Site-to-Site VPNs—Connects two sites in an organization together and allows secure communications between the sites.
Figure 1: Site-to-Site VPNHub-and-Spoke (establishment all peers)—Connects branch offices to the corporate office in an enterprise network. You can also use this topology to connect spokes together by sending traffic through the hub.
Figure 2: Hub-and-Spoke (establishment all peers)Hub-and-Spoke (establishment by spokes)—Auto-VPN supports an IPsec VPN aggregator called a hub that serves as a single termination point for multiple tunnels to remote sites called spokes. Auto-VPN allows network administrators to configure a hub for current and future spokes. No configuration changes are required on the hub when spoke devices are added or deleted, which allows administrators flexibility in managing large-scale network deployments.
Figure 3: Hub-and-Spoke (establishment by spokes)Hub-and-Spoke (Auto Discovery VPN)—Auto Discovery VPN (ADVPN) is a technology that allows the central hub to dynamically inform spokes about a better path for traffic between two spokes. When both spokes acknowledge the information from the hub, the spokes establish a shortcut tunnel and change the routing topology for the host to reach the other side without sending traffic through the hub.
Figure 4: Hub-and-Spoke (Auto Discovery VPN)-
Remote Access VPN (Juniper Secure Connect)—Juniper Secure Connect provides secure remote access for the users to connect to the corporate networks and resources remotely using the Internet. Juniper Secure Connect downloads the configuration from SRX Services devices and chooses the most effective transport protocols during connection establishment.
Figure 5: Remote Access VPN (Juniper Secure Connect)
Field Descriptions - IPsec VPNs Page
Field |
Description |
---|---|
Name |
The name of the IPsec VPN. |
Description |
The description of the IPsec VPN. |
VPN Topology |
The types of deployment topologies for IPsec VPN, such as site-to-site, hub-and-spoke, and remote access VPNs. |
Profile Type |
The type of VPN profile, such as Inline Profile or Shared Profile. |
Profile Name |
The name of the VPN profile. The security parameters are defined in this profile to establish the VPN connection between two sites. |
Tunnel Mode |
The tunnel mode, such as Route Based or Policy Based. |
Configuration State |
The configuration state of the IPsec VPN. |
Status |
Displays the publish state of the VPN configuration. You can verify your VPN configurations before updating the configuration to the device.
|
Created by |
The email address of the user who created the IPsec VPN. |