ip profile
•
Use to specify the IP profile that the IPSec layer passes on to the IP layer upon request
for upper-layer instantiation.
•
Example
host1(config-ipsec-tunnel-profile)#
ip profile ipProfile1
•
Use the
no
version to remove the association with this profile.
•
See ip profile.
Defining the Server IP Address
The
local ip address
command defines the specified local IP address as the server
address. The router monitors UDP port 500 for incoming login requests (that is, IKE SA
negotiations) from users.
NOTE:
This address is typically made public to all users trying to connect to a VPN on
this router.
This command enables you to optionally set a global preshared key for the specified
server address. When using global preshared keys, keep the following in mind:
•
Global preshared keys enable a group of users to share a single authentication key,
simplifying the administrative job of setting up keys for multiple users.
•
Specific keys for individual users have higher priority than global keys. If both individual
and global keys are configured, the individual that also has a specific key must use that
key or authentication fails.
•
More than one profile can specify the same local endpoint and virtual router. Because
the last value set overrides the other, we recommend that you avoid this type of
configuration.
local ip address
•
Use to specify the given local IP address as a server address.
•
Example
host1(config-ipsec-tunnel-profile)#
local ip address 192.2.52.12
•
Use the
no
version to stop the router from monitoring UDP port 500 for user requests
and remove any preshared key associations with the local IP address.
•
See local ip address.
Specifying Local Networks
The
local ip network
command enables you to specify local, reachable networks through
the IPSec tunnel. This type of “ split tunneling” enables a remote station to separate VPN
traffic from Internet traffic. For example a client connecting to a corporate Intranet could
use split-tunneling to send all traffic destined to 10.0.0.0/8 through the secure tunnel
177
Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Configuring Dynamic IPSec Subscribers
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...