You are here: Configure > Security Services > VPN > IPsec (Phase II).
To add an IPSec policy:
The Add Policy page appears.
Table 273: Fields on the Add Policy Page
Field | Action |
---|---|
IPSec Policy | |
Name | Enter a name of the remote gateway. |
Description | Enter a description of the policy to associate it with an IPSec tunnel. |
Perfect Forward Secrecy | Displays the method the device uses to generate the encryption key. PFS generates each new encryption key independent of the previous key. Select a method from the list:
Note: Starting in Junos OS Release 19.1R1, the new DH-Groups supports SRX5000 Series devices with SPC3 card upon installation of junos-ike package only. To install junos-ike package from J-Web, navigate to Configure > Security Services > IPsec VPN > Global Settings and click Install. |
Proposal | |
Predefined | Specifies that the anti-replay checking feature of IPsec be disabled. By default, anti-replay checking is enabled. Select Predefined, and select a proposal type from the list:
|
User defined | Specifies a list of proposals previously defined by the user. Click User Defined, select Proposals from the pop-up menu, and then click Add. Note: When this IKE policy is configured for Dynamic VPN, the selected P1 proposal can only have one item for User Defined proposal. |
Proposal List | Select the P1 Proposals from the Available table and by using the arrow move it to the Selected P1 Proposals table. Note: When this IKE policy is configured for Dynamic VPN, the selected P1 proposal can only have one item for User Defined. |
© 2020 Juniper Networks, Inc. All rights reserved