Configuring Ike Proposals; Configuring The Authentication Algorithm For An Ike Proposal; Configuring The Authentication Method For An Ike Proposal - Juniper ACX1000 Configuration Manual

Junos os; acx series universal access router
Hide thumbs Also See for ACX1000:
Table of Contents

Advertisement

ACX Series Universal Access Router Configuration Guide

Configuring IKE Proposals

Configuring the Authentication Algorithm for an IKE Proposal

Configuring the Authentication Method for an IKE Proposal

1100
Dynamic security associations (SAs) require IKE configuration. With dynamic SAs, you
configure IKE first, and then the SA. IKE creates the dynamic SAs and negotiates them
for IPsec. The IKE configuration defines the algorithms and keys used to establish the
secure IKE connection with the peer security gateway.
You can configure one or more IKE proposals. Each proposal is a list of IKE attributes to
protect the IKE connection between the IKE host and its peer.
To configure an IKE proposal, include the
[edit services ipsec-vpn ike]
[edit services ipsec-vpn ike]
proposal proposal-name {
authentication-algorithm (md5 | hmac-sha-256-128| hmac-sha1-96);
authentication-method pre-shared-keys;
dh-group (group1 | group2 | group5 |group14);
encryption-algorithm algorithm;
lifetime-seconds seconds;
}
This section includes the following topics:
Configuring the Authentication Algorithm for an IKE Proposal on page 1100
Configuring the Authentication Method for an IKE Proposal on page 1100
Configuring the Encryption Algorithm for an IKE Proposal on page 1101
Configuring the Lifetime for an IKE SA on page 1101
Example: Configuring an IKE Proposal on page 1102
To configure the authentication algorithm for an IKE proposal, include the
authentication-algorithm
statement at the
hierarchy level:
proposal-name]
[edit services ipsec-vpn ike proposal proposal-name]
authentication-algorithm (hmac-sha-256-128| hmac-sha1-96);
ACX Series routers support the following authentication algorithms:
—Hash algorithm that authenticates packet data. Produces a 160-bit
hmac-sha1-96
authenticator value.
hmac-sha-256-128
—Hash algorithm that authenticates packet data. Produces a 256-bit
authenticator value.
To configure the authentication method for an IKE proposal, include the
statement at the
authentication-method
hierarchy level:
proposal-name]
statement and specify a name at the
proposal
hierarchy level:
[edit services ipsec-vpn ike proposal
[edit services ipsec-vpn ike proposal
Copyright © 2017, Juniper Networks, Inc.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Acx5048Acx5096Acx500Acx1100Acx2000Acx2100 ... Show all

Table of Contents