packets to and from the SRP module, as it does for other UDP packets. As a result,
the UDP statistics maintained by the SRP module do not reflect UDP-encapsulated
IPSec packets.
NAT Keepalive Messages
The router does not generate NAT keepalive messages. The following reasons explain
why this behavior does not generally pose problems for remote users.
■
The primary application for using NAT-T is enabling secure L2TP/IPSec access
to an E Series router for remote hosts located behind a NAT device. The L2TP
protocol has its own keepalive mechanism that is sufficient for keeping NAT
entries alive.
■
In most NAT configurations, an ERX router does not operate behind the NAT
device, thereby making the generation of keepalive messages unnecessary.
If the router receives NAT keepalive messages as part of the L2TP/IPSec traffic flow,
it discards these messages at the ingress line module on which the messages were
received.
Configuring and Monitoring NAT-T
For instructions on configuring and monitoring NAT-T, see the sections listed in Table
17 on page 295.
Table 17: Configuration and Monitoring Tasks for NAT-T
See Section
Command
Task
“Configuring NAT-T” on page 298
ipsec option nat-t
Enabling and disabling NAT-T on a
virtual router
“Monitoring DVMRP/IPSec,
GRE/IPSec, and L2TP/IPSec Tunnels”
on page 307
show ipsec option
Displaying information about the
current NAT-T setting on a virtual
router
“Monitoring DVMRP/IPSec,
GRE/IPSec, and L2TP/IPSec Tunnels”
on page 307
show ipsec ike-sa
Displaying information about the
IKE SA negotiation when NAT-T is
enabled
Single-Shot Tunnels
You can use the
single-shot-tunnel
command in L2TP Destination Profile Host
Configuration mode to configure a single-shot L2TP tunnel. Although configuration
of single-shot tunnels is more typically used with secure L2TP/IPSec tunnels, as
described in this chapter, you can also configure single-shot tunnels for nonsecure
L2TP tunnels that do not run over an IPSec connection.
A
single-shot tunnel
has the following characteristics:
■
The L2TP tunnel can carry no more than a single L2TP session for the duration
of its existence.
L2TP/IPSec Tunnels
■
295
Chapter 12: Securing L2TP and IP Tunnels with IPSec
Содержание JUNOSE 11.0.X IP SERVICES
Страница 6: ...vi...
Страница 8: ...viii JUNOSe 11 0 x IP Services Configuration Guide...
Страница 18: ...xviii Table of Contents JUNOSe 11 0 x IP Services Configuration Guide...
Страница 20: ...xx List of Figures JUNOSe 11 0 x IP Services Configuration Guide...
Страница 22: ...xxii List of Tables JUNOSe 11 0 x IP Services Configuration Guide...
Страница 28: ...2 Chapters JUNOSe 11 0 x IP Services Configuration Guide...
Страница 138: ...112 Monitoring J Flow Statistics JUNOSe 11 0 x IP Services Configuration Guide...
Страница 286: ...260 Monitoring IP Tunnels JUNOSe 11 0 x IP Services Configuration Guide...
Страница 312: ...286 Monitoring IP Reassembly JUNOSe 11 0 x IP Services Configuration Guide...
Страница 357: ...Part 2 Index Index on page 333 Index 331...
Страница 358: ...332 Index JUNOSe 11 0 x IP Services Configuration Guide...