Encryption; Hash Function; Authentication Mode - Juniper IP SERVICES - CONFIGURATION GUIDE V 11.1.X Configuration Manual

Ip services configuration guide
Table of Contents

Advertisement

the peer security gateway accepts is used for that IKE session. This procedure is
repeated for every IKE session that needs to be established.

Encryption

A specific encryption transform can be applied to an IKE policy. The supported
encryption algorithms are:
DES
3DES

Hash Function

A specific hash function can be applied to an IKE policy. The supported ones are:
MD5
SHA-1
IKE also uses an authentication algorithm during IKE exchanges. This authentication
algorithm is automatically set to the HMAC version of the specified hash algorithm.
Therefore, you cannot have the hash function set to MD5 and the authentication
algorithm set to HMAC-SHA.

Authentication Mode

As part of the IKE protocol, one security gateway needs to authenticate the other
security gateway to make sure that the IKE SA is established with the intended party.
The ERX router supports two authentication methods:
Digital certificates (using RSA algorithms)
For digital certificate authentication, an initiator signs message interchange data
using his private key, and a responder uses the initiator's public key to verify
the signature. Typically, the public key is exchanged via messages containing
an X.509v3 certificate. This certificate provides a level of assurance that a peer's
identity (as represented in the certificate) is associated with a particular public
key.
For more information, see "Configuring Digital Certificates" on page 213.
Preshared keys
With preshared key authentication mode, the same secret string (similar to a
password) must be configured on both security gateways before the gateways
can authenticate each other. It is not advisable to share a preshared key among
multiple pairs of security gateways, because it reduces the key's security level.
The router allows preshared keys to be up to 256 ASCII alphanumeric characters.
Chapter 5: Configuring IPSec
143
IKE Overview

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IP SERVICES - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Junose 11.1.x ip servicesJunose v 11.1

Table of Contents