Juniper IP SERVICES - CONFIGURATION GUIDE V 11.1.X Configuration Manual page 257

Ip services configuration guide
Table of Contents

Advertisement

NOTE: This command replaces "ipsec isakmp-policy-rule" on page 226 , which may
be removed completely in a future release.
ipsec isakmp-policy-rule
NOTE: This command has been replaced by "ipsec ike-policy-rule" on page 225 and
may be removed completely in a future release.
ipsec key generate
Use to define an ISAKMP/IKE policy.
When you enter the command, you include a number that identifies the policy
and assigns a priority to the policy. You can number policies in the range
1–10000, with 1 having the highest priority.
Example
host1(config)#ipsec ike-policy-rule 3
host1(config-ike-policy)#
Use the no version to remove policies. If you do not include a priority number
with the no version, all policies are removed.
See ipsec ike-policy-rule.
Use to define an ISAKMP/IKE policy.
When you enter the command, you include a number that identifies the policy
and assigns a priority to the policy. You can number policies in the range
1–10000, with 1 having the highest priority.
Example
host1(config)#ipsec isakmp-policy-rule 3
host1(config-ike-policy)#
Use the no version to remove policies. If you do not include a priority number
with the no version, all policies are removed.
See ipsec isakmp-policy-rule.
Use to generate RSA key pairs. Include a length of either 1024 or 2048 bits. The
generated keys can be used only after the CA issues a certificate for them.
Example
host1(config)#ipsec key generate rsa 2048
Please wait.................................................
..........................
IPsec Generate Keys complete
Configuring Digital Certificates Using the Online Method
Chapter 8: Configuring Digital Certificates
231

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.1.x ip servicesJunose v 11.1

Table of Contents