Configuring an IPSec Proposal


An IPSec proposal lists protocols and algorithms (security services) to be negotiated with the remote IPSec peer. To configure an IPSec proposal, include the proposal statement:

 [edit security ipsec]  proposal  ike-proposal-name  {   authentication-algorithm (md5  sha1);   authentication-method pre-shared-keys;   dh-group (group1  group2);   encryption-algorithm (3des-cbc  des-cbc);   lifetime-seconds  seconds;  } 

To configure an IPSec authentication algorithm, include the authentication-algorithm statement. The authentication algorithm can be one of the following:

  • hmac-md5-96 ” Hash algorithm that authenticates packet data, producing a 128-bit digest

  • hmac-sha1-96 ” Hash algorithm that authenticates packet data, producing a 160-bit digest

To configure an IPSec encryption algorithm, include the encryption-algorithm statement. The encryption algorithm can be one of the following:

  • 3des-cbc ” Block size is 24 bytes, and key length is 192 bits

  • des-cbc ” Block size is 8 bytes, and key length is 48 bits

The IPSec lifetime option sets the lifetime of an IPSec SA. When the SA expires , it is replaced by a new SA (and SPI) or terminated . If you do not configure a lifetime and a lifetime is not sent by a responder , it defaults to 28,800 seconds. To configure the IPSec lifetime, include the lifetime-seconds statement.



Juniper Networks Field Guide and Reference
Juniper Networks Field Guide and Reference
ISBN: 0321122445
EAN: 2147483647
Year: 2002
Pages: 185

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net