IKE policies are global to the router. Every ISM on a router uses the same set of policies
when negotiating IKE SAs. The agreed-on IKE SA between the local system and a remote
security gateway may vary, because it depends on the IKE policies used by each remote
peer. However, the initial set of IKE policies the router uses is always the same and
independent of which peer the router is negotiating with.
During negotiation, the router might skip IKE policies that require parameters that are
not configured for the remote security gateway with which the IKE SA is being negotiated.
You can define up to ten IKE policies, with each policy having a different combination of
security parameters. A default IKE policy that contains default values for every policy
parameter is available. This policy is used only when IKE policies are not configured and
IKE is required.
The following sections describe each of the parameters contained in an IKE policy.
Priority
Priority allows better (more secure) policies to be given preference during the negotiation
process. However, every IKE policy is considered secure enough to secure the IKE SA flow.
During IKE negotiation, all policies are scanned, one at a time, starting from the
highest-priority policy and ending with the lowest-priority policy. The first policy that the
peer security gateway accepts is used for that IKE session. This procedure is repeated
for every IKE session that needs to be established.
Encryption
A specific encryption transform can be applied to an IKE policy. The supported encryption
algorithms are:
•
DES
•
3DES
Hash Function
A specific hash function can be applied to an IKE policy. The supported ones are:
•
MD5
•
SHA-1
IKE also uses an authentication algorithm during IKE exchanges. This authentication
algorithm is automatically set to the HMAC version of the specified hash algorithm.
Therefore, you cannot have the hash function set to MD5 and the authentication algorithm
set to HMAC-SHA.
Authentication Mode
As part of the IKE protocol, one security gateway needs to authenticate the other security
gateway to make sure that the IKE SA is established with the intended party. The ERX
router supports two authentication methods:
•
Digital certificates (using RSA algorithms)
Copyright © 2010, Juniper Networks, Inc.
136
JunosE 11.2.x IP Services Configuration Guide
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...