You are on page 1of 11

IPSec VPN Between Paloalto And SSG 20

1/5-192.168.45.195
1/5-192.168.45.195 0/0-192.168.45.147
0/0-192.168.45.147
Paloalto SSG 20

1/3-192.168.80.1
1/3- 192.168.80.1 Tunnel.1 Tunnel.1 0/1-10.10.10.10
0/1-10.10.10.10
20.0.0.2 20.0.0.1

192.168.80.10 10.10.10.1
10.10.10.1
Step 1 – Create IKE Crypto Profile (phase I)
Network>IKE Crypto>IKE Crypto Profile

Step 2 – i) IKE Gateway


Network>IKE Gateway>genral

Step 2 – ii) Network>IKE Gateway > Advance


Step 3 –IPSec Crypto (phase II)
Network > IPSec Crypto

Step 4 –Create Tunnel Interface


Network > Interfaces > Tunnel

Step 5 –Create Zones


Network > Zones
Step 6 –Create Monitor Profile
Network > Monitor

Step 7 – i) Create IPSec Tunnel


Network > IPSec Tunnels > Genral

Step 7 – ii) IPSec Tunnel Proxy Ids


Network > IPSec Tunnels > Proxy Ids > IPV4
Step 8 –Static Route
Network > Virtual Routers > Static Route

Step 9 – Create Policy for VPN


Policies > Security
Now configure Same VPN as Paloalto in Juniper SSG 20
Step 1 –create P1 Proposal

Step 2 –i) Define Gateway for P1

Step 2 –ii)Advanced Configuration


Step 3 –Create P2 Proposal

Step 4 –Create Zones


Step 5 –Create Tunnel Interface

Step 6 –Routing
Step 7 –AutoKey IKE P2
Step 8 --Create Policy

You might also like