•
Exposes identities of the peers to eavesdropping, making it less secure than main
mode.
•
Is faster than main mode because fewer messages are exchanged between peers.
(Three messages are exchanged in aggressive mode.)
•
Enables support for fully qualified domain names (FQDNs) when the router uses
preshared keys.
The next section describes aggressive mode in more detail.
Aggressive Mode Negotiations
During aggressive mode phase 1 negotiations, the E Series router behaves as follows:
•
When the router is the initiator, the router searches all policy rules to find those that
allow aggressive mode. The router then selects the rule with the highest priority and
uses the rule to initiate phase 1 negotiations. If there are no policy rules with aggressive
mode allowed, the router selects the highest-priority rule that allows main mode.
•
When the router is the responder, the negotiation depends on what the initiator
proposes, as well as what is configured in the policy rules.
Table 13 on page 135 outlines the possible combinations of initiator proposals and policy
rules. As indicated, allowing aggressive mode in a policy rule allows negotiation to take
place no matter what the initiator requests.
Table 13: Initiator Proposals and Policy Rules
Responder Policy
Rule
Initiator Requests
(Rekeyed)
Initiator Requests
(First Time)
Aggressive Mode
Setting
Aggressive or Main modes
(follows initiator)
Follows First Time
Main mode
Accepted
Aggressive or Main modes
(follows initiator)
Follows First Time
Aggressive mode
Requested
Aggressive mode
Aggressive Mode
Aggressive mode
Required
Main mode
Main Mode
Main mode
None
The router responds to phase 1 negotiations with the highest-priority policy rule that
matches the initiator. A match means that all parameters, including the exchange type,
match.
IKE Policies
An IKE policy defines a combination of security parameters to be used during the IKE SA
negotiation. IKE policies are configured on both security gateway peers, and there must
be at least one policy on the local peer that matches a policy on the remote peer. Failing
that, the two peers are not able to successfully negotiate the IKE SA, and no data flow
is possible.
135
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Configuring IPSec
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...