Zach Gibbs, Content Developer, Juniper Networks

Troubleshooting Juniper Secure Connect

Learning Bytes Security
Zach Gibbs Headshot
Slide showing a topology diagram, with a headline that reads, “Troubleshooting Juniper Secure Connect.” A bullet list reads, “Criteria for example: * Juniper Secure Connect is not working properly: * Set up extended logging; * Three different troubleshooting scenarios: - Authentication error; - Connection errors; - Connection success, but unable to reach Server-1; * Success?: - Remote worker can access Server-1.”

Juniper Learning Byte: The 411 on troubleshooting Juniper Secure Connect

Watch as Juniper’s Zach Gibbs walks you step by step through the process of troubleshooting broken connections using Juniper Secure Connect. If you’re new to Secure Connect, consider this essential viewing.

Show more

You’ll learn

  • How to troubleshoot three different scenarios: authentication error, connection error, and connection success but unable to reach server 

  • How to enable extended logs — the first step in the troubleshooting process 

  • How to test out connections from the remote worker device 

Who is this for?

Network Professionals Business Leaders

Host

Zach Gibbs Headshot
Zach Gibbs
Content Developer, Juniper Networks 

Resources

Transcript

0:02 [Music]

0:11 hello my name is zach gibbs and i'm

0:14 a content developer within education

0:16 services

0:17 inside juniper networks and today we

0:20 will be going through the

0:21 troubleshooting juniper secure connect

0:24 part 1

0:25 learning byte and before i continue i

0:27 want to point out that this is part one

0:29 of a three-part series

0:31 so please when you're done with this

0:32 learning byte check out the other parts

0:36 all right so here is our example the

0:38 topology you see here might be kind of

0:40 familiar if you've gone through my other

0:42 juniper secure connect learning bytes

0:44 because it's the same one

0:45 and so what we have is we have a few

0:48 different devices we have srx1

0:50 that is connected to the user's zone and

0:54 then it's connected to the server's zone

0:56 and then it's connected to the

0:57 untrust zone now the user zone has just

1:00 your typical branch

1:01 users and then the server zone has

1:03 server one now take special note of that

1:05 ip address of server one

1:07 that is 10.60.60.100 that'll be

1:10 very important for our learning byte

1:12 today okay then the remote worker is

1:14 connecting to the internet and the

1:15 remote worker needs to access

1:17 server one and not access anything else

1:19 in the user zone we want to prevent that

1:21 type of access

1:22 and so what are we doing for this

1:24 learning fight well currently

1:26 juniper secure connect is not working

1:28 properly and so we'll do a few things to

1:30 troubleshoot this problem first we'll

1:32 set up extended logging so we can really

1:34 understand what's going on

1:35 and then we're going to have three

1:37 different troubleshooting scenarios

1:38 we're going to have an authentication

1:40 error scenario some connection errors

1:42 then a connection success but

1:44 then after that we won't be able to

1:46 access server one with the remote worker

1:48 through juniper secure connect

1:51 okay so and with this what is our

1:52 definition of success

1:54 well success is when the remote worker

1:56 can access server one

1:58 and so with that being said let's go

1:59 ahead and jump

2:01 to the remote worker and get this

2:03 started

2:06 all right so here is the remote worker

2:09 device

2:09 and what we want to first do is we want

2:11 to first configure extended logging

2:14 and if we go to the juniper secure

2:15 connect client and we select help

2:18 and then go to extended log settings and

2:21 here we are able to enable extended logs

2:24 and first we'll do the enable driver

2:26 full trace

2:27 and that's for the client vpn dialing

2:29 service and then we'll also want to

2:31 enable

2:32 extended pki logs and extended pki

2:36 interface logs as well as client monitor

2:39 client command line tool and credential

2:41 provider and you may or may not need to

2:43 restart these

2:44 uh normally you don't but if you are

2:45 having problems with this then you can

2:47 click restart

2:48 let's click ok and then let's try to

2:50 connect to the vpn but before i do that

2:53 i do want to

2:54 show that here on the side we're pinging

2:58 the server 1 ip address and since we're

3:00 not connected to the vpn right now we

3:02 can't reach it and that's

3:03 expected behavior and so here in the

3:06 client you can see it says extended log

3:08 mode it's blinking so you know it is

3:10 running in extended log mode

3:12 and before we actually connect let's

3:14 actually go back to help and then open

3:15 the logbook

3:17 and here's the logbook let's go ahead

3:18 and clear that screen

3:20 and then let's go ahead and attempt the

3:22 connection

3:24 and we're going to use our lab username

3:27 a password and immediately we get kicked

3:32 out now here you can see just in the

3:33 client you see a message that says

3:35 configuration download authentication

3:37 fill

3:38 and if you look in the logbook you can

3:40 see pretty much the same area you really

3:41 don't get a lot of good information

3:43 from something like this but if we

3:44 scroll to the right we can see that

3:46 we started to download the configuration

3:48 from the 10.111.111.1 host that's the

3:51 host we're connecting to that's the srx1

3:53 device

3:55 and then we just get told that

3:56 configuration download didn't work

3:58 because of

3:59 authentication failure and so this could

4:01 be a situation to where the user is

4:03 trying to log in and they can't they

4:04 can't do it they can't do it and so

4:05 they're upset they think there's

4:06 something wrong so they call you as the

4:08 i.t

4:08 administrator and they want you to

4:11 figure out what's wrong and so we know

4:12 that the remote worker tried to log in

4:14 just

4:14 couldn't log in and so let's go ahead

4:16 and jump to the srx1 cli

4:19 and look at the logs we're going to find

4:20 some more information there

4:23 all right so here is the srx1 cli and

4:26 let's look at the log messages

4:28 show log messages and then we'll match

4:31 on remote

4:32 underscore access

4:35 and there's one message here great so

4:37 what do we see we see authentication

4:39 field for user lab

4:40 and then it gives the vpn name which is

4:43 ravpnsdlb

4:44 uh from ip address that's the ip address

4:47 that the user is coming in

4:48 on and then we have the actual message

4:50 that we want to see invalid username or

4:52 password so what's happening here we

4:53 know the user is using the right user

4:55 name it's lab but they're using the

4:57 wrong password so we can just tell them

4:59 hey

4:59 use the right password and so this is a

5:01 way for you to find

5:03 out that the user is using the wrong

5:05 password we know the username is correct

5:07 but we know that authentication is

5:09 failing and it's got to be either an

5:10 invalid username

5:12 or password and so in this case it's

5:13 definitely an invalid password so let's

5:16 go ahead and jump back to the remote

5:17 worker device and enter the correct

5:18 password and see what happens

5:22 okay so here is the remote worker device

5:23 let's attempt to log in again

5:26 and we'll enter lab and then lab one two

5:28 three which is the correct password here

5:31 and things are looking a little

5:32 different tunnel setup that's great

5:35 and tunnel establishment and look at

5:37 that we can communicate

5:39 with the server one ip address and you

5:41 can look at the log book on the left and

5:43 you

5:43 can see exactly what happens there's a

5:45 lot of logs to go through here i'm not

5:46 going to go through every one

5:48 but if you're really interested in the

5:50 entire process this extended logging

5:52 will tell you

5:52 everything that happens it's incredibly

5:54 helpful

5:56 what we have is we have a few different

5:58 devices we have

5:59 srx1 that is connected to the user's

6:02 zone and then it's connected to the

6:05 server's zone and then it's connected to

6:07 the untrust zone

6:08 now the user zone has just your typical

6:10 branch users and then the server

6:12 zone has server one now take special

6:14 note of that ip address of server one

6:17 that is 10.60.60.100. that'll be

6:20 very important for our learning byte

6:22 today okay then the remote worker is

6:24 connecting to the internet and the

6:25 remote worker needs to access

6:27 server one and not access anything else

6:29 in the user zone we want to prevent that

6:31 type of access

6:32 and so what are we doing for this

6:34 learning fight well currently

6:36 juniper secure connect is not working

6:38 properly and so we'll do a few things to

6:40 troubleshoot this problem first we'll

6:42 set up extended logging so we can really

6:44 understand what's going on

6:46 and then we're going to have three

6:47 different troubleshooting scenarios

6:48 we're gonna have an authentication error

6:50 scenario some connection errors

6:52 then a connection success but then after

6:55 that we won't be able to access

6:57 server one with the remote worker

6:58 through juniper secure connect

7:01 okay so and with this what is our

7:02 definition of success

7:04 well success is when the remote worker

7:06 can access server one

7:08 and so with that being said let's go

7:09 ahead and jump

7:11 to the remote worker and get this

7:14 started

7:16 all right so let's go ahead and attempt

7:18 to log in with the remote worker device

7:20 and see what happens

7:29 you can see it's trying here it's kind

7:31 of taking its time that's

7:32 not what we saw when we connected last

7:35 time so there's definitely a problem

7:37 here

7:37 you can see here that it shows that

7:39 we're checking valid configuration

7:42 and it almost seems like things are

7:44 going to time out

7:45 and it did okay so what do we have here

7:48 in the client we see

7:49 https request failed failed to connect

7:53 to

7:53 that ip address that we're using port

7:55 443 timed out

7:57 and in the logs that's just kind of what

8:00 it shows too

8:00 nothing really extra in the logs here in

8:03 the client logs that is in the log book

8:05 so with that let's go ahead and jump

8:06 back to srx1

8:08 cli and see what's in the log messages

8:10 there

8:13 all right so here is srx1 again so let's

8:16 do the

8:17 show log messages match remote access

8:20 and we first see a fail message that was

8:23 a part of the other step then we see an

8:25 auth okay and then a logout okay and so

8:27 that's when we connected successfully

8:29 and then logged out successfully

8:30 so there's nothing new in there so we

8:32 can look at the log messages again and

8:34 look at

8:35 kmd or match on kmd and there is one

8:39 connection but this was the good

8:40 connection

8:41 and it shows that things went through

8:43 okay and what this log message is

8:45 actually showing

8:46 is that when we disconnected it showed

8:48 that the ipsec essays were cleared

8:50 the security association so nothing too

8:53 helpful there

8:54 but remember that the log message on the

8:56 client said it couldn't connect

8:58 on port 443 that kind of sounds like a

9:01 security zone doesn't it so let's look

9:03 at the security zone

9:09 and you can see here that the host

9:10 inbound traffic system services

9:12 is deactivated we need https

9:15 ike and tcp and cap enabled for host

9:19 inbound services for a juniper secure

9:22 connect vpn to work

9:23 so let's go ahead and activate that

9:30 and then i'll clear the log messages

9:32 just to get rid of the old logs

9:35 and then let's go ahead and jump back to

9:37 the remote worker device

9:39 and see if this changes anything

9:43 all right so here is the remote worker

9:44 device let's try to connect again

9:53 things are looking a little better

9:57 and that connection established great

9:59 and we can see we're talking with the

10:01 server again

10:01 perfect so that fixed our problem

10:05 what we have is we have a few different

10:07 devices we have srx1

10:10 that is connected to the user's zone and

10:13 then it's connected to the server's zone

10:15 and then it's connected to the untrust

10:17 zone

10:17 now the user zone has just your typical

10:20 branch users and then the server zone

10:22 has

10:22 server one now take special note of that

10:25 ip address of server one

10:26 that is 10.60.60.100 that'll be

10:29 very important for our learning byte

10:31 today okay then the remote worker is

10:33 connecting to the internet and the

10:35 remote worker needs to access

10:36 server one and not access anything else

10:39 in the user zone we want to prevent that

10:40 type of access

10:42 and so what are we doing for this

10:43 learning fight well currently juniper

10:46 secure connect is not working properly

10:48 and so we'll do a few things to

10:49 troubleshoot this problem

10:51 first we'll set up extended logging so

10:53 we can really understand what's going on

10:55 and then we're going to have three

10:56 different troubleshooting scenarios

10:58 we're going to have an authentication

10:59 error scenario some connection errors

11:01 then a connection success but then after

11:04 that we won't be able to access

11:06 server one with the remote worker

11:08 through juniper secure connect

11:10 okay so and with this what is our

11:12 definition of success

11:14 well success is when the remote worker

11:16 can access server one

11:17 and so with that being said let's go

11:19 ahead and jump

11:21 to the remote worker and get this

11:23 started

11:25 all right so let's go ahead and connect

11:27 to the vpn

11:28 and see what happens

11:39 all right things are looking good the

11:40 tunnel's being set up and the tunnel is

11:42 established

11:43 perfect however notice that we're not

11:46 able to reach that server

11:48 that ping that i have running is not

11:51 giving us anything back the request is

11:53 still timing out so we have

11:55 another problem we can connect but we

11:56 can't communicate with the server

11:59 and we can look through these logs these

12:00 logs are actually a little more helpful

12:02 now

12:02 since we have a bunch of stuff to look

12:04 through and we can see here that it

12:07 downloads the configuration

12:09 and then phase one sets up we see phase

12:12 one phase one

12:14 and then we start getting into phase two

12:16 and so yeah this is a little confusing

12:19 there's

12:20 really a lot of stuff in here but

12:22 something i do want to point out here in

12:24 phase two i want to point out something

12:26 this

12:28 these messages right here we see source

12:30 ranges 10.77.77.33

12:33 and then it says for any port oh let me

12:36 stop the logging and go back up

12:41 and then it says dst ranges destination

12:44 ranges 10.99.99.99

12:48 for any port uh zero through six five

12:50 five three five

12:52 and so if you know anything about these

12:55 logs if you've worked with this before

12:56 this is kind of something hard just to

12:58 to guess what this what the problem is

13:00 here and so

13:02 this is what we're getting for the

13:04 traffic selector

13:06 and so you might realize that

13:09 this 1099.99.0 for the destination

13:12 traffic

13:12 selector that's not the server address

13:15 and so we might have a problem with the

13:17 traffic selector so let's go ahead and

13:19 jump to the cli

13:20 of vsrx1 and do a little more digging

13:25 okay so here is the cli of srx1 let's

13:28 look at the log messages

13:31 we'll match on kmd and there's nothing

13:35 currently there and this might seem a

13:36 little confusing you might have expected

13:37 to see something here

13:39 and the reason behind it is it's not

13:41 going to

13:42 collect the log messages that we're

13:44 looking for when the user logs in

13:47 but it might collect something when the

13:48 user logs out so let's jump back to the

13:50 remote worker device

13:51 and log out of the vpn

13:55 so let's disconnect

13:59 all right so we disconnected and let's

14:01 go ahead and jump back to srx1

14:05 okay so here's srx1 again let's run that

14:08 command one more time

14:09 and you can see here we have something

14:11 of value we have a log message

14:13 and if we dig into this we can find out

14:15 more information

14:16 and so one thing i want to point out is

14:18 under traffic selector

14:20 we've got the remote id we've got that

14:24 1077-7733

14:26 then we have the local id of 10.99.9

14:31 notice that's not the server ip address

14:34 that's a problem so let's go ahead and

14:36 look into that all right so let's go

14:37 into the security

14:38 ipsec vpn

14:42 vpn name traffic selector and then the

14:45 traffic selector name

14:47 and we can see in here that the traffic

14:49 selector is configured

14:50 incorrectly so let's change that

14:55 change it to the server ip address

14:59 and commit that configuration all right

15:01 so that configuration is

15:03 committed let's go ahead and jump to the

15:04 remote worker device and test things out

15:08 all right so here is the remote worker

15:10 device let's go ahead and attempt the

15:11 connection again

15:18 and it's connecting again and did that

15:20 last time remember connected but we

15:22 couldn't communicate with the server

15:24 and look at the command prompt we can

15:27 see that we

15:28 are communicating with the server and we

15:30 have fixed that problem

15:33 so that brings us to the end of this

15:35 learning byte and also the end of this

15:37 learning byte series

15:38 and in this learning bite we

15:40 demonstrated how to troubleshoot

15:41 juniper secure connect problems so as

15:44 always thanks for watching

15:47 visit the juniper education services

15:49 website

15:50 to learn more about courses view our

15:53 full range of classroom

15:54 online and e-learning courses

15:58 learning paths industry segment and

16:00 technology specific

16:02 training paths juniper networks

16:05 certification program

16:06 the ultimate demonstration of your

16:08 competence and

16:10 the training community from forums to

16:12 social media

16:13 join the discussion

Show more