Solved

Juniper Netscreen SSG20 VPN Config

Posted on 2013-05-14
8
1,097 Views
Last Modified: 2013-06-26
Hi

I have a working VPN config between a remote Checkpoint site (that I dont manage) and our Juniper Netscreen.

VPN is policy based with traffic at the remote site only being allowed to initiate a connection for an application they run to a server at our end. All works fine.

I now need to allow a print server queue located at my site to send print jobs to a printer at the remote site. The application that is run creates a print request to the database at my end sends the print to to the print queue. I am told by the admin at the remote site that I need to add the printer IP to my encryption domain and give it the relevant access ie port 9100 outgoing through the tunnel.

How do I add the printer IP to my encryption domain?
Once added do I add a trust to untrust policy for the port number?

Thanks
0
Comment
Question by:Winfix1
  • 4
  • 4
8 Comments
 
LVL 18

Accepted Solution

by:
Sanga Collins earned 500 total points
ID: 39165833
There is no encryption domain on juniper devices. So I am thinking this is a checkpointe firewall term.

The equivalent, since you are using a policy based VPN, would be to allow port 9100 through the VPN. If you are restricting access in the policy by specifying source and destination IPs, then the print server and printer IPs would need to be added to the policy for it to work properly.
0
 

Author Comment

by:Winfix1
ID: 39167262
Thanks.

OK at present I just have an Incoming policy for the VPN. There is no outgoing policy as outgoing traffic to the VPN was not required before.

How do I create an relevant outgoing policy to point the traffic  to the VPN for the remote printer IP traffic?
0
 
LVL 18

Expert Comment

by:Sanga Collins
ID: 39167692
if you edit the incoming policy for the VPN. there is a check mark at the bottom for "Modify matching bidirectional VPN policy " Enabling this will create the matching policy VPN for traffic going the opposite way.
0
 

Author Comment

by:Winfix1
ID: 39167736
Thanks OK. But what do I need to modify so that my server sends/routes traffic for the printer ip 10.132.145.10 down the vpn tunnel? Currently it tries to just send out to the internet.
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 18

Expert Comment

by:Sanga Collins
ID: 39167769
The destination IP of the matching VPN policy should be 10.132.145.0/24, this will make sure all traffic destined for that subnet goes via the VPN and not out to the internet.
0
 

Author Comment

by:Winfix1
ID: 39167846
Hi
Thanks. Ticking "Modify matching bidirectional VPN policy", does not stick. It reverts back to unticked?

Here is the policy

Policy
The source address is 80.x.x.x through a MIP. But traffic I generate needs to go down the tunnel to 10.132.145.10, this is where the printer will try to send to.

How would I set 10.132.145.10 to go down the tunnel?

Thanks
0
 
LVL 18

Expert Comment

by:Sanga Collins
ID: 39167900
I see your problem, this is not a VPN. It is actually a mapped IP. Basically your internal server is reachable from the internet via the public IP MIP(81.*.*.229)

In this configuration you will not be able to actually print to the printer in the other network.

In a policy based VPN, This is what you would have:
The source IP would be your LAN.
The destination IP would be the remote LAN.
The action would be = tunnel.
The tunnel VPN = The autokey IKE setup under the VPN menu.
And lastly you could then check the box for matching bidirectional vpn.

Below is a screen shot of a policy based VPN. Mine is one way only so the bidirection is unchecked

policy
policy 2
0
 

Author Closing Comment

by:Winfix1
ID: 39277461
Thanks
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
SSL RA VPN 7 77
Excessive tcp resends from my ASA 7 30
SRX240 SYSLOG Setting 6 51
IT Contract Fee 17 75
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now