Table 10: Security Parameters per IPSec Policy Type
Signaled
Manual
Security Parameter
Required
Required
Operational VR
Required
Required
Transport VR
Optional
Optional
Perfect forward secrecy
Optional
Optional
Lifetime
Not applicable
Required
Inbound and outbound SAs
Required
Required
Transform set
Operational Virtual Router
The operational VR for a secure IP tunnel is the VR in which a secure IP tunnel exists.
The IP address and mask associated with a secure IP interface exist only within the
operational VR under which the interface is declared. The VR defines the network prefix,
which is reachable through the logical IP interface.
A secure IP tunnel is always a member of one and only one operational VR. Therefore,
the operational VR attributes are mandatory for any secure tunnel. These attributes
include:
•
IP address and mask
•
Virtual router on which the secure IP interface exists
Transport Virtual Router
The transport VR for a secure IP tunnel is the VR in which both of the secure tunnel
endpoints, the source and destination, are routable addresses. Normally, the transport
VR is the default ISP routing infrastructure on top of which VPNs are provisioned.
The IPSec Service module (ISM) is a security gateway and, as such, is one of the endpoints
for secure tunnels. The tunnel endpoints are the tunnel
source
and the tunnel
destination
IP addresses. For IKE signaled IPSec tunnels, you can use the fully qualified domain name
(FQDN) instead of the IP address to identify the tunnel endpoints. You typically use this
feature to identify the tunnel destination endpoint in DSL and broadband environments.
See “Transport VR Definitions with an FQDN” on page 127 in this section.
•
The tunnel source IP address must be one of the local IP addresses configured on the
router.
•
The tunnel destination address must be a routable IP address within the transport VR
routing tables.
The transport VR information is required, although its explicit configuration is not. If
omitted, the transport VR is assumed to be the same as the operational VR. However,
the tunnel source and destination are mandatory elements.
Copyright © 2010, Juniper Networks, Inc.
126
JunosE 11.2.x IP Services Configuration Guide
Summary of Contents for JUNOSE 11.2.X IP SERVICES
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Page 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Page 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Page 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Page 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Page 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Page 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Page 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...