You can configure IPSec conditions for JUNOS policy rules. Use the following configuration statements to add IPSec conditions to a classify-traffic condition:
- policies group name list name rule name traffic-condition name ipsec-condition
{
- spi spi ;
- ip-flags ip-flags ;
- ip-flags-mask ip-flags-mask ;
- fragment-offset fragment-offset ;
- packet-length packet-length ;
- protocol protocol ;
- protocol-operation protocol-operation;
- }
To add IPSec conditions to a classify-traffic condition:
- user@host# edit policies group vpn list input
rule pr traffic-condition ctc ipsec-condition
- [edit policies group vpn list input rule pr traffic-condition
ctc ipsec-condition]
- user@host# set spi spi
- [edit policies group vpn list input rule pr traffic-condition
ctc ipsec-condition]
- user@host# set ip-flags ip-flags
- [edit policies group vpn list input rule pr traffic-condition
ctc ipsec-condition]
- user@host# set ip-flags-mask ip-flags-mask
- [edit policies group vpn list input rule pr traffic-condition
ctc ipsec-condition]
- user@host# set fragment-offset fragment-offset
- [edit policies group vpn list input rule pr
traffic-condition ctc ipsec-condition]
- user@host# set packet-length packet-length
- [edit policies group vpn list input rule pr traffic-condition
ctc ipsec-condition
- user@host# set protocol protocol
[edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition user@host# show spi 2; ip-flags 0; ip-flags-mask 0; fragment-offset 0; packet-length packetLength; protocol ah; protocol-operation 1;