[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring an IKE Access Profile

You can configure only one tunnel profile per service set for all dynamic peers. The configured preshared key in the profile is used for IKE authentication of all dynamic peers terminating in that service set. Alternatively, you can include the ike-policy statement to reference an IKE policy you define with either specific identification values or a wildcard (the any-remote-id option). You configure the IKE policy at the [edit services ipsec-vpn ike] hierarchy level; for more information, see Configuring an IKE Policy.

The IKE tunnel profile specifies all the information needed to complete the IKE negotiation. Each protocol has its own statement hierarchy within the client statement to configure protocol-specific attribute value pairs, but only one client configuration is allowed for each profile. The following is the configuration at the [edit access] hierarchy level; for more information on access profiles, see the JUNOS System Basics Configuration Guide.

profile profile-name {
client * {
ike {
allowed-proxy-pair {
remote remote-proxy-address local local-proxy-address;
}
pre-shared-key [ascii-text key-string] [hexadecimal key-string];
ike-policy policy-name;
interface-id <string-value>;
}
}
}

Note: For dynamic peers, the JUNOS software supports the IKE main mode with either the preshared key method of authentication or an IKE access profile that uses a local digital certificate.

  • In preshared key mode, the IP address is used to identify a tunnel peer to get the preshared key information. The client value * (wildcard) means that configuration within this profile is valid for all dynamic peers terminating within the service set accessing this profile.
  • In digital certificate mode, the IKE policy defines which remote identification values are allowed; for more information, see Configuring an IKE Policy.

The following statements make up the IKE profile:


[Contents] [Prev] [Next] [Index] [Report an Error]