Juniper JUNOSE 11.2.X IP SERVICES Configuration Manual page 350

For e series broadband services routers - ip services configuration
Table of Contents

Advertisement

JunosE 11.2.x IP Services Configuration Guide
encapsulation modes.................................................129
encapsulation protocols............................................129
ESP.....................................................................................122
ESP processing..............................................................132
invalid cookies................................................................151
L2TP with IPSec..................................................169, 275
license...............................................................................138
monitoring......................................................................160
overview............................................................................119
packet encapsulation..................................................123
protocol stack................................................................122
reassembly of tunnel packets................................270
remote access......................................................169, 275
secure IP interfaces......................................................122
security parameters.....................................................124
security parameters per policy type......................126
tunnel destination endpoint....................................126
tunnel failover................................................................133
tunnel source endpoint..............................................126
See also L2TP with IPSec
IPSec CA identity commands
crl........................................................................................219
enrollment retry-limit.................................................219
enrollment retry-period.............................................219
enrollment url................................................................219
ipsec ca identity............................................................222
issuer-identifier.............................................................222
root proxy url..................................................................222
ipsec certificate commands
ipsec certificate-database refresh.........................215
ipsec certificate-request generate.........................215
ipsec commands...................................................................219
ipsec ca authenticate.................................................219
ipsec ca enroll................................................................219
ipsec ca identity............................................................222
ipsec clear.........................................................................151
ipsec crl....................................................................215, 216
ipsec identity..................................................................216
ipsec ike-policy-rule....................................................150
ipsec isakmp-policy-rule...........................................150
ipsec key generate.....................................217, 222, 225
ipsec key manual pre-share.....................................139
ipsec key pubkey-chain rsa......................................225
ipsec key zeroize...................................................217, 222
ipsec lifetime..................................................................139
ipsec local-endpoint....................................................141
ipsec option dpd...........................................................143
ipsec option nat-t.......................................................286
ipsec option tx-invalid-cookie..................................151
324
ipsec transform-set......................................................141
key.......................................................................................141
masked-key.....................................................................141
See also show ipsec commands
IPSec identity commands
common-name.............................................................213
country..............................................................................213
domain-name................................................................213
ipsec identity..................................................................216
organization.....................................................................217
IPSec IKE policy commands
aggressive-mode................................................148, 180
authentication....................................148, 213, 219, 225
encryption.......................................................................148
group.................................................................................148
hash...................................................................................148
ip address virtual-router............................................180
ipsec ike-policy-rule..................................217, 222, 225
ipsec isakmp-policy-rule..................................217, 222
lifetime...............................................................................151
IPSec security parameters
in relation to IPSec interface....................................125
inbound SAs...........................................................124, 127
lifetime..............................................................................124
lifetime for user SAs.....................................................127
manual versus signaled.............................................125
negotiating transforms...............................................129
operational VR...............................................................124
outbound SAs........................................................124, 127
per IPSec policy type...................................................126
perfect forward secrecy (PFS)........................124, 127
transform combinations supported.......................131
transform sets.......................................................124, 129
transforms supported................................................130
transport VR..........................................................124, 126
IPSec transport local profile commands
pre-share........................................................................289
pre-share-masked......................................................289
IPSec transport profile commands...............................289
application.....................................................................289
ipsec transport profile...............................................289
lifetime............................................................................289
local ip address............................................................289
pfs group........................................................................289
transform-set...............................................................289
See also show ipsec transport commands
IPSec tunnel profile commands
domain-suffix.................................................................174
extended-authentication...........................................174
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.2.x

Table of Contents