SNMP through Netscreen VPN

Christopher Gripp cgripp at AXCELERANT.COM
Fri Apr 20 14:12:52 EDT 2001


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

David,
For the trusted network in the policy are you using the default
"Inside Any"  if so I have seen problems with this.  We build out a
trusted network explicitly and then use it in the policy.  I don't
know if this will effect your issue but you could try it.
 
Chris

- -----Original Message-----
From: David Leija [mailto:DLeija at PENSON.COM]
Sent: Thursday, April 19, 2001 8:39 AM
To: VPN at SECURITYFOCUS.COM
Subject: SNMP through Netscreen VPN



Thank you for your detailed explanation and suggestions. I think I've
been 
able to absorb the content in your response. Yet I still can't
initiate 
traffic directly from a Netscreen to a remote LAN IP. Consider the 
following: 

Lan1---NS1------------------------NS2---Lan2 

As you suggested, I have added the untrusted interface IP to the
trusted 
side of the address book. I then created a policy, using the new
address as 
the source, directed such traffic to be encrypted, and use our
existing and 
functional site to site VPN. I performed these steps on both units.
My 
problem remains. From any host on Lan1, other then NS1, I can access
any 
host on Lan2, including NS2. The reverse is also true in that from
any host 
on Lan2 minus NS2, I can access any host on Lan1 including NS1.
However, 
from NS1(telneted to the unit), cannot initiate traffic to any host
on Lan2, 
including the trusted interface of NS2. The reverse is also true
here. From 
NS2 I cannot access any host on Lan1 including the trusted interface
of NS1. 


I believe my problem is for the most part as you described. I think
that 
traffic initiating from a Netscreen uses its untrusted IP as the
source IP 
and then follows it routing rules, sending the packets to whatever
its 
upstream gateway is. I verified this by running 'exec trace-route'
from a 
Netscreen to the remote lan. The output confirms that the packets are
not 
being tunneled but simply routed upstream then lost. 

There must be something in addition to the steps already taken that
is 
needed to permit this type of communication. I've already modified
policy 
orders. Nothing. Do I need a completely separate VPN? Is there some
issue 
that occurs when adding the IP of the untrusted interface to the
trusted 
side of the address book? TIA 

L. David Leija 
Penson Financial Services 
dleija at penson.com 
(214) 765-1228 


>From: Jeff Dell <jdell at TELEPLACE.COM> 
>Reply-To: Jeff Dell <jdell at TELEPLACE.COM> 
>To: VPN at SECURITYFOCUS.COM 
>Subject: Re: SNMP through Netscreen VPN 
>Date: Tue, 10 Apr 2001 07:36:59 -0400 
> 
>When a packet leaves the Netscreen that is not destined for it's
>Trusted or  DMZ LANs the packet leaves the Netscreen with a source
>IP of the Untrusted  Port.  When the destination is the remote LAN
>through the VPN tunnel, the  Netscreen will not go through the
>tunnel, because the VPN policy reads  
> 
>set policy outgoing "Inside Any" "Remote LAN" "ANY" Encrypt
>vpn-tunnel "VPN  to NY" 
> 
>The source address is the problem here.  It reads "Inside Any".  The
> Untrusted Ip is not a part of "Inside Any".  Therefore you must do
>the  following on the local (lets call this the CA Netscreen) to
>correct the  problem. 
> 
>1.  Create an entry for the Untrusted IP in the Trust side of the 
>Address  book .  This will make this address available for selection
>in the Source  pull down menu for the Outgoing policies. 
> 
>2.  Create a policy like the following. 
> 
>set policy outgoing "Untrusted Port" "Remote LAN" "ANY" Encrypt
>vpn-tunnel  "VPN to NY" 
> 
>This completes one side of the problem.  Basically, this policy will
>allow  anything with a source IP of the Untrusted Port and a
>destination port of  anything on the Remote LAN to be passed through
>the tunnel.  The packet  
will 
>get to the desired host on the other side of the tunnel.  However,
>the  packet will not get back, because the remote Netscreen does not
>have a  policy to allow this.  Therefore, we will need to do the
>following on the  remote Netscreen (lets call this the NY
>Netscreen). 
> 
>1.  Create an Untrusted side address book entry for the Untrusted
>Port of  the original CA Netscreen. 
> 
>2.  Create a policy like the following. 
> 
>set policy outgoing "Inside Any" "CA Untrust IP" "ANY" Encrypt
>vpn-tunnel  "VPN to CA" 
> 
>Now the Netscreens are configured such that packets that originate
>from the  CA Netscreen can reach the NY LAN and be returned. 
> 
>Jeff 
> 
>-----Original Message----- 
>From: L. David Leija [ mailto:ldl1971 at HOTMAIL.COM
><mailto:ldl1971 at HOTMAIL.COM> ]  Sent: Monday, April 09, 2001 8:50 PM
>To: VPN at SECURITYFOCUS.COM 
>Subject: SNMP through Netscreen VPN 
> 
> 
>We've deployed 2 Netscreen-10's and successfully established an
>AutoKey  encrypted tunnel between them. We also utilize the
>SNMP/Perl monitoring  software, MRTG. We are able to monitor data
>from the Netscreen on the near  side of the tunnel, however we
>cannot get SNMP to talk to the remote  Netscreen through the tunnel.
>We can ping it fine, we also have complete  access to all resources
>on the remote site through the tunnel. However,  
SNMP 
>always gets "SNMP Error:no response received" when trying to
>establish a  session. Any clues on where the problem is? The VPN
>tunnel, the remote  Netscreen, or MRTG. I don't thinks its MRTG as
>it is currently monitoring  countless other devices successfully. 
> 
>_________________________________________________________________ 
>Get your FREE download of MSN Explorer at http://explorer.msn.com
><http://explorer.msn.com>   
> 
>VPN is sponsored by SecurityFocus.COM 
> 
>VPN is sponsored by SecurityFocus.COM  

VPN is sponsored by SecurityFocus.COM 


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>

iQA/AwUBOuB7bWLRPLnfp/zREQJfigCffbpHDTG6DajK3kQZwhJukJo9p3AAoKHH
v4vGLjcZHYCFumuJqxM2Jyhy
=AAKt
-----END PGP SIGNATURE-----

VPN is sponsored by SecurityFocus.COM




More information about the VPN mailing list