Configuring IPSec Conditions (SRC CLI)
You can configure IPSec conditions for JUNOS policy rules. Use the following configuration statements to add IPSec conditions to a classify-traffic condition:
- policies group name list name rule name traffic-condition name ipsec-condition
{
- spi spi ;
- ip-flags ip-flags ;
- ip-flags-mask ip-flags-mask ;
- fragment-offset fragment-offset ;
- packet-length packet-length ;
- protocol protocol ;
- protocol-operation protocol-operation;
- }
To add IPSec conditions to a classify-traffic condition:
- From configuration mode, enter the IPSec configuration. For example:
- (Optional) Specify the authentication header (AH) or the encapsulating security payload (ESP) security parameter index (SPI).
- (Optional) Configure the value of the IP flags field in the IP header.
- (Optional) Configure the mask that is associated with the IP flag.
- (Optional) Configure the value of the fragment offset field.
- (Optional) Configure the packet length on which to match. The length refers only to the IP packet, including the packet header, and does not include any layer 2 encapsulation overhead.
- Configure the protocol matched by this classify-traffic condition.
- (Optional) Verify the IPSec condition configuration.
[edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition user@host# show spi 2; ip-flags 0; ip-flags-mask 0; fragment-offset 0; packet-length packetLength; protocol ah; protocol-operation 1;

