Juniper IP SERVICES - CONFIGURATION GUIDE V 11.1.X Configuration Manual page 362

Ip services configuration guide
Table of Contents

Advertisement

JUNOSe 11.1.x IP Services Configuration Guide
ipsec commands........................................................227
ipsec ca authenticate...........................................227
ipsec ca enroll.....................................................227
ipsec ca identity..................................................230
ipsec clear...........................................................158
ipsec crl......................................................223, 225
ipsec identity......................................................225
ipsec ike-policy-rule............................................158
ipsec isakmp-policy-rule......................................158
ipsec key generate..............................226, 230, 233
ipsec key manual pre-share................................146
ipsec key pubkey-chain rsa.................................233
ipsec key zeroize.........................................226, 230
ipsec lifetime......................................................146
ipsec local-endpoint............................................147
ipsec option dpd.................................................150
ipsec option nat-t................................................299
ipsec option tx-invalid-cookie..............................158
ipsec transform-set.............................................148
key......................................................................148
masked-key........................................................148
See also show ipsec commands
IPSec identity commands
common-name...................................................221
country...............................................................221
domain-name.....................................................221
ipsec identity......................................................225
organization........................................................226
IPSec IKE policy commands
aggressive-mode.........................................156, 189
authentication.............................156, 221, 227, 233
encryption..........................................................156
group..................................................................156
hash....................................................................156
ip address virtual-router......................................189
ipsec ike-policy-rule............................225, 230, 233
ipsec isakmp-policy-rule..............................226, 230
lifetime...............................................................158
IPSec security parameters
in relation to IPSec interface...............................131
inbound SAs...............................................130, 133
lifetime...............................................................130
lifetime for user SAs............................................133
manual versus signaled.......................................131
negotiating transforms........................................135
operational VR....................................................130
outbound SAs.............................................130, 133
per IPSec policy type..........................................132
perfect forward secrecy (PFS).....................130, 133
transform combinations supported.....................137
transform sets.............................................130, 135
transforms supported.........................................136
transport VR...............................................130, 132
IPSec transport local profile commands
pre-share............................................................302
pre-share-masked...............................................302
336
Index
IPSec transport profile commands.............................302
application..........................................................302
ipsec transport profile.........................................302
lifetime...............................................................302
local ip address...................................................302
pfs group............................................................302
transform-set......................................................302
See also show ipsec transport commands
IPSec tunnel profile commands
domain-suffix......................................................182
extended-authentication.....................................182
ike local-identity.................................................182
ike peer-identity..................................................182
ip profile.............................................................182
ipsec tunnel profile.............................................181
lifetime...............................................................182
local ip address...................................................182
local ip identity...................................................182
local ip network..................................................182
max-interfaces....................................................182
peer ip identity...................................................182
pfs group............................................................182
transform............................................................182
tunnel mtu..........................................................182
IPSec tunnel profiles..................................................181
IPv6
license..................................................................71
monitoring....................................................88, 120
J
J-Flow commands
clear ip flow stats................................................106
ip flow statistics....................................................98
ip flow-cache entries...........................................100
ip flow-cache timeout active...............................100
ip flow-cache timeout inactive............................100
ip flow-export.....................................................100
ip flow-sampling-mode packet-interval...............100
ip route-cache flow sampled.................................98
J-Flow statistics, clearing............................................106
K
keepalive messages, NAT-T........................................295
key-string command..................................................236
keys, public
displaying on router............................................237
format of............................................................221
obtaining without digital certificates...........220, 232
L
L2C (Layer 2 Control) See ANCP (Access Node Control
Protocol)
L2F, reassembly of tunnel packets.............................280

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.1.x ip servicesJunose v 11.1

Table of Contents