vmware DHCP service and vmnetcfg.exe tool
Remote Access VPN - CLI | Link to YouTube Video | ||
---|---|---|---|
NCP-e client | https://www.ncp-e.com/en/login/exclusive-remote-access/
| ||
Configuration Steps | |||
Step 1. Configure User access profile and IP Address Pool Step 2. Configure IPSec Phase 1 Step 3. Configure IPSec Phase 2 Step 4. Configure Dynamic VPN Parameters Step 5. Configure Security Policy Step 6. Verifying IPSec Connection | |||
| |||
enable policy from untrust to trust |
| ||
on lubuntu | 1- enable SSH: lubuntu 20 live ssh and root remote access 2- add static route back to the windows client : ip route and static route sudo ip route add 192.168.100.0/24 via 10.0.2.2 dev ens38
| ||
full config of SRX |
| ||
NCP-e CLient setup | |||
Create a New connect: Configuration > Profile: Add > name= RA-NCP-LB ( LB for Learning Byte) | |||
Communication Medium: LAN (over IP) GW / tunnel endpoint: 10.0.3.2 no certiifcate for Authentication VPN user ID: NCP-user1 / lab123 | |||
DFS-grpu: group19 local IDE (IKE): user@LB.net | |||
Edit Profile | IPsec general Settings: Exch Mode: aggressive ( behind NAT modem ) IKE Policy: PSK IKEv2 DH Group: DH19 PFS Group: DH19 (prime256v1 ) | ||
Identities: Pre-shared key: secret: juniper123 | |||
Show commands | |||
show security ike security-associations 10.100.10.1 detail Exchange type: aggressive show security ipsec security-associations vpn-name RA-NCP-VPN phase 2 security assocation show security ike active-peer details Peer IKE-ID used | |||
show security ike active-peer aaa-username bob | |||
show subscribers client-type xauth show subscribers client-type xauth username bob <detail. | |||