host1(config-ipsec-transport-profile)#
2.
Specify one or more types of application that the profile secures.
host1(config-ipsec-transport-profile)#
application gre dvmrp l2tp
You can then set any of the following parameters for the profile:
•
Set a lifetime range for the IPSec connection in volume of traffic or seconds.
host1(config-ipsec-transport-profile)#
lifetime seconds 3600 28800 kilobytes 102400
4294967295
•
Configure Perfect Forward Secrecy (PFS) for connections created with this IPSec
transport profile.
host1(config-ipsec-transport-profile)#
pfs group 5
•
Specify one or more transform sets that an IPSec transport connection uses to negotiate
a transform algorithm.
host1(config-ipsec-transport-profile)#
transform-set esp-3des-hmac-sha
esp-3des-hmac-md5
To display the available transform sets, issue the
transform-set ?
command.
•
Specify the local endpoint (for L2TP, the LNS address) of the IPSec transport
connection, and enter Local IPSec Transport Profile mode.
host1(config-ipsec-transport-profile)#
local ip address 10.10.1.1
host1(config-ipsec-transport-profile-local)#
•
(Optional) Configure a key for IKE negotiations. For example:
Enter the unencrypted key. The router encrypts the key and stores it in encrypted form.
You can no longer retrieve the unencrypted key.
host1(config-ipsec-transport-profile-local)#
pre-share secretforGre
application
Use to specify the types of application secured by connections created with this IPSec
transport profile. You can specify multiple applications on the same command line:
•
•
dvmrp
—Secures DVMRP tunnel traffic
•
gre
—Secures GRE tunnel traffic
•
l2tp
—Secures L2TP traffic
•
l2tp-nat-passthrough—
Secures L2TP traffic and also allows clients to connect from
behind NAT devices that support IPSec passthrough. To allow these clients to
connect, the router:
•
Does not generate or verify UDP checksums. This does not compromise security,
because IPSec protects UDP packets with an authentication algorithm far stronger
than UDP checksums.
Copyright © 2010, Juniper Networks, Inc.
290
JunosE 11.2.x IP Services Configuration Guide
Summary of Contents for JUNOSE 11.2.X IP SERVICES
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Page 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Page 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Page 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Page 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Page 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Page 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Page 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...