From Global Configuration mode, type
ipsec ca identity
, and press Enter.
host1(config)#
ipsec ca identity
host1(config-ca-identity)#
?
crl Certificate Revocation List checking
default Set a command to its default(s)
do Run an exec mode command (alias command run)
enrollment Configure enrollment parameters
exit Exit from the current command mode
help Describe the interactive help system
issuer-identifier issuer identifier
log Configure logging settings
macro Run a CLI macro
no Negate a command or set its default(s)
root Specify root proxy
run Run an exec mode command (alias command do)
sleep Make the Command Interface pause for a specified
IPSec Identity Configuration Mode
In this mode, you can specify the information that the system uses in offline certificate
requests and during negotiations with its peers.
From Global Configuration mode, type
ipsec identity
, and press Enter.
host1(config)#
ipsec identity
host1(config-ipsec-identity)#
?
common-name Common Name
country Country name
default Set a command to its default(s)
do Run an exec mode command (alias command run)
domain-name Domain name
exit Exit from the current command mode
help Describe the interactive help system
log Configure logging settings
macro Run a CLI macro
no Negate a command or set its default(s)
organization Organization name
sleep Make the Command Interface pause for a specified duration
IPSec IKE Policy Configuration Mode
In this mode, you can create an IKE policy, which is used during IKE phase 1 negotiation.
From the Global Configuration mode, type
ipsec ike-policy-rule
and the
policyNumber
,
and press Enter.
host1(config)#
ipsec ike-policy-rule 10
host1(config-ike-policy)#
?
aggressive-mode Allows aggressive mode negotiation for the tunnel
authentication Configure the authentication method
default Set a command to its default(s)
do Run an exec mode command (alias command run)
encryption Configure the encryption algorithm within an IKE policy
exit Exit from the current command mode
group Configure the Diffie-Hellman group identifier
hash Configure the hash algorithm within an IKE policy
help Describe the interactive help system
lifetime Configure the time an SA will live before expiration
log Configure logging settings
91
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Command-Line Interface
Summary of Contents for JUNOSE 11.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 3 x System Basics Configuration Guide...
Page 24: ...Copyright 2010 Juniper Networks Inc xxiv JunosE 11 3 x System Basics Configuration Guide...
Page 32: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 3 x System Basics Configuration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 116 JunosE 11 3 x System Basics Configuration Guide...
Page 166: ...Copyright 2010 Juniper Networks Inc 136 JunosE 11 3 x System Basics Configuration Guide...
Page 432: ...Copyright 2010 Juniper Networks Inc 402 JunosE 11 3 x System Basics Configuration Guide...
Page 488: ...Copyright 2010 Juniper Networks Inc 458 JunosE 11 3 x System Basics Configuration Guide...
Page 524: ...Copyright 2010 Juniper Networks Inc 494 JunosE 11 3 x System Basics Configuration Guide...
Page 554: ...Copyright 2010 Juniper Networks Inc 524 JunosE 11 3 x System Basics Configuration Guide...
Page 566: ...Copyright 2010 Juniper Networks Inc 536 JunosE 11 3 x System Basics Configuration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 558 JunosE 11 3 x System Basics Configuration Guide...
Page 613: ...PART 3 Index Index on page 585 583 Copyright 2010 Juniper Networks Inc...
Page 614: ...Copyright 2010 Juniper Networks Inc 584 JunosE 11 3 x System Basics Configuration Guide...
Page 632: ...Copyright 2010 Juniper Networks Inc 602 JunosE 11 3 x System Basics Configuration Guide...