encapsulation modes.................................................129
encapsulation protocols............................................129
ESP.....................................................................................122
ESP processing..............................................................132
invalid cookies................................................................151
L2TP with IPSec..................................................169, 275
license...............................................................................138
monitoring......................................................................160
overview............................................................................119
packet encapsulation..................................................123
protocol stack................................................................122
reassembly of tunnel packets................................270
remote access......................................................169, 275
secure IP interfaces......................................................122
security parameters.....................................................124
security parameters per policy type......................126
tunnel destination endpoint....................................126
tunnel failover................................................................133
tunnel source endpoint..............................................126
See also
L2TP with IPSec
IPSec CA identity commands
crl........................................................................................219
enrollment retry-limit.................................................219
enrollment retry-period.............................................219
enrollment url................................................................219
ipsec ca identity............................................................222
issuer-identifier.............................................................222
root proxy url..................................................................222
ipsec certificate commands
ipsec certificate-database refresh.........................215
ipsec certificate-request generate.........................215
ipsec commands...................................................................219
ipsec ca authenticate.................................................219
ipsec ca enroll................................................................219
ipsec ca identity............................................................222
ipsec clear.........................................................................151
ipsec crl....................................................................215, 216
ipsec identity..................................................................216
ipsec ike-policy-rule....................................................150
ipsec isakmp-policy-rule...........................................150
ipsec key generate.....................................217, 222, 225
ipsec key manual pre-share.....................................139
ipsec key pubkey-chain rsa......................................225
ipsec key zeroize...................................................217, 222
ipsec lifetime..................................................................139
ipsec local-endpoint....................................................141
ipsec option dpd...........................................................143
ipsec option nat-t.......................................................286
ipsec option tx-invalid-cookie..................................151
ipsec transform-set......................................................141
key.......................................................................................141
masked-key.....................................................................141
See also
show ipsec commands
IPSec identity commands
common-name.............................................................213
country..............................................................................213
domain-name................................................................213
ipsec identity..................................................................216
organization.....................................................................217
IPSec IKE policy commands
aggressive-mode................................................148, 180
authentication....................................148, 213, 219, 225
encryption.......................................................................148
group.................................................................................148
hash...................................................................................148
ip address virtual-router............................................180
ipsec ike-policy-rule..................................217, 222, 225
ipsec isakmp-policy-rule..................................217, 222
lifetime...............................................................................151
IPSec security parameters
in relation to IPSec interface....................................125
inbound SAs...........................................................124, 127
lifetime..............................................................................124
lifetime for user SAs.....................................................127
manual versus signaled.............................................125
negotiating transforms...............................................129
operational VR...............................................................124
outbound SAs........................................................124, 127
per IPSec policy type...................................................126
perfect forward secrecy (PFS)........................124, 127
transform combinations supported.......................131
transform sets.......................................................124, 129
transforms supported................................................130
transport VR..........................................................124, 126
IPSec transport local profile commands
pre-share........................................................................289
pre-share-masked......................................................289
IPSec transport profile commands...............................289
application.....................................................................289
ipsec transport profile...............................................289
lifetime............................................................................289
local ip address............................................................289
pfs group........................................................................289
transform-set...............................................................289
See also
show ipsec transport commands
IPSec tunnel profile commands
domain-suffix.................................................................174
extended-authentication...........................................174
Copyright © 2010, Juniper Networks, Inc.
324
JunosE 11.2.x IP Services Configuration Guide
Summary of Contents for JUNOSE 11.2.X IP SERVICES
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Page 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Page 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Page 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Page 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Page 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Page 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Page 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Page 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...