•
Use to configure an unencrypted (red) preshared key to authenticate IKE negotiations
that arrive from any remote IP address specified for this transport profile and that are
destined for the local IP address. If the remote endpoint address is a wildcard address,
this preshared key is a group preshared key.
CAUTION:
Group preshared keys are not fully secure, and we do not recommend using
them. They are provided for trials and testing purposes where the missed security does
not pose a risk to the provider.
•
To have preshared key authentication take place, you must also specify the IKE policy
rule as preshared by entering
authentication pre-share
in ISAKMP Policy Configuration
mode.
•
Example
host1(config-ipsec-transport-profile-local)#
pre-share secretforL2tp
•
Use the
no
version to remove the key.
NOTE:
After you enter a preshared key, the original (unencrypted) key cannot be
retrieved. If you need to reenter the original key (for example, the system goes to factory
default and you have only the
show config
output) you can:
1.
Use the
show config
command to see the encrypted (masked) form of the key.
2.
Use the
pre-shared-masked
command to enter the masked key. The system will
behave the same as when you entered the first
pre-share
key command.
•
See pre-share.
pre-share-masked
•
Use to specify an encrypted preshared key. To obtain this key, you enter an unencrypted
key using the
pre-share
command. You then run the
show config
command, and the
router displays the preshared key in encrypted form. You enter the encrypted key using
the
pre-share-masked
command.
•
The router uses the preshared key to authenticate IKE negotiations that arrive from
any remote IP address specified for this transport profile and that are destined for any
local IP address specified for this transport profile. If the remote endpoint address is
a wildcard address, this preshared key is a group preshared key.
CAUTION:
Group preshared keys are not fully secure, and we do not recommend using
them. They are provided for trials and testing purposes, where the missed security does
not pose a risk to the provider.
293
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Securing L2TP and IP Tunnels with IPSec
Содержание JUNOSE 11.2.X IP SERVICES
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 8: ...Copyright 2010 Juniper Networks Inc viii JunosE 11 2 x IP Services Configuration Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii JunosE 11 2 x IP Services Configuration Guide...
Страница 22: ...Copyright 2010 Juniper Networks Inc xxii JunosE 11 2 x IP Services Configuration Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 2 JunosE 11 2 x IP Services Configuration Guide...
Страница 116: ...Copyright 2010 Juniper Networks Inc 90 JunosE 11 2 x IP Services Configuration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 118 JunosE 11 2 x IP Services Configuration Guide...
Страница 230: ...Copyright 2010 Juniper Networks Inc 204 JunosE 11 2 x IP Services Configuration Guide...
Страница 262: ...Copyright 2010 Juniper Networks Inc 236 JunosE 11 2 x IP Services Configuration Guide...
Страница 294: ...Copyright 2010 Juniper Networks Inc 268 JunosE 11 2 x IP Services Configuration Guide...
Страница 328: ...Copyright 2010 Juniper Networks Inc 302 JunosE 11 2 x IP Services Configuration Guide...
Страница 345: ...PART 2 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 346: ...Copyright 2010 Juniper Networks Inc 320 JunosE 11 2 x IP Services Configuration Guide...
Страница 356: ...Copyright 2010 Juniper Networks Inc 330 JunosE 11 2 x IP Services Configuration Guide...