the peer security gateway accepts is used for that IKE session. This procedure is
repeated for every IKE session that needs to be established.
Encryption
A specific encryption transform can be applied to an IKE policy. The supported
encryption algorithms are:
■
DES
■
3DES
Hash Function
A specific hash function can be applied to an IKE policy. The supported ones are:
■
MD5
■
SHA-1
IKE also uses an authentication algorithm during IKE exchanges. This authentication
algorithm is automatically set to the HMAC version of the specified hash algorithm.
Therefore, you cannot have the hash function set to MD5 and the authentication
algorithm set to HMAC-SHA.
Authentication Mode
As part of the IKE protocol, one security gateway needs to authenticate the other
security gateway to make sure that the IKE SA is established with the intended party.
The ERX router supports two authentication methods:
■
Digital certificates (using RSA algorithms)
For digital certificate authentication, an initiator signs message interchange data
using his private key, and a responder uses the initiator's public key to verify
the signature. Typically, the public key is exchanged via messages containing
an X.509v3 certificate. This certificate provides a level of assurance that a peer's
identity (as represented in the certificate) is associated with a particular public
key.
For more information, see “Configuring Digital Certificates” on page 213.
■
Preshared keys
With preshared key authentication mode, the same secret string (similar to a
password) must be configured on both security gateways before the gateways
can authenticate each other. It is not advisable to share a preshared key among
multiple pairs of security gateways, because it reduces the key's security level.
The router allows preshared keys to be up to 256 ASCII alphanumeric characters.
IKE Overview
■
143
Chapter 5: Configuring IPSec
Summary of Contents for JUNOSE 11.0.X IP SERVICES
Page 6: ...vi...
Page 8: ...viii JUNOSe 11 0 x IP Services Configuration Guide...
Page 18: ...xviii Table of Contents JUNOSe 11 0 x IP Services Configuration Guide...
Page 20: ...xx List of Figures JUNOSe 11 0 x IP Services Configuration Guide...
Page 22: ...xxii List of Tables JUNOSe 11 0 x IP Services Configuration Guide...
Page 28: ...2 Chapters JUNOSe 11 0 x IP Services Configuration Guide...
Page 138: ...112 Monitoring J Flow Statistics JUNOSe 11 0 x IP Services Configuration Guide...
Page 286: ...260 Monitoring IP Tunnels JUNOSe 11 0 x IP Services Configuration Guide...
Page 312: ...286 Monitoring IP Reassembly JUNOSe 11 0 x IP Services Configuration Guide...
Page 357: ...Part 2 Index Index on page 333 Index 331...
Page 358: ...332 Index JUNOSe 11 0 x IP Services Configuration Guide...