• Juniper NAT-IPsec hack
  • Example Juniper deployment:
  • Hacking matching Juniper bogus policies
  • Automating the hack
  • Rekey problem
  • auto=start issue
  • Conclusion