Negotiating Transforms
Inside a transform set, IPSec transforms are numbered in a priority sequence.
•
During negotiation as an initiator of the user SA, the router uses transform number one
first. If the remote system does not agree on the transform, the router then tries number
two, and so on. If both end systems do not agree on a transform, the user SA fails and
the secure IP tunnel is not established.
•
During negotiation as a responder, the router compares the proposed transform from
the remote end against each transform in the transform set. If there is no match, the
router provides a negative answer to the remote end, which can either try another
transform or give up. If no match is found, the secure IP tunnel is not established.
Other Security Features
The following sections briefly describe other supported security features for the ERX
routers. These features include the following:
•
“IP Security Policies” on page 132
•
“ESP Processing” on page 132
•
“AH Processing” on page 132
This section also provides a pointer to the IPSec system maximums.
IP Security Policies
The ERX router does not support a systemwide SPD. Instead, the router takes advantage
of routing to forward traffic to and from a secure tunnel. The router still applies IPSec
selectors to traffic going into or coming out of a secure tunnel so that unwanted traffic
is not allowed inside the tunnel. Supported selectors include IP addresses, subnets, and
IP address ranges.
ESP Processing
The router supports both the encryption and authentication functions of ESP
encapsulation as defined in RFC 2406. Specifically, the router supports:
•
DES and 3DES encryption algorithms
•
The HMAC-SHA and HMAC-MD5 authentication algorithms
•
ESP security options on a per-tunnel (per-SA) basis
•
Tunnel mode
AH Processing
The router supports AH encapsulation as defined in RFC 2402. Specifically, the router
supports:
•
HMAC-SHA and HMAC-MD5 authentication algorithms
•
AH authentication options on a per-tunnel (per-SA) basis
•
Tunnel mode
Copyright © 2010, Juniper Networks, Inc.
132
JunosE 11.2.x IP Services Configuration Guide
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...