You can configure only one tunnel profile per service set for all dynamic peers. The configured preshared key in the profile is used for IKE authentication of all dynamic peers terminating in that service set. Alternatively, you can include the ike-policy statement to reference an IKE policy you define with either specific identification values or a wildcard (the any-remote-id option). You configure the IKE policy at the [edit services ipsec-vpn ike] hierarchy level; for more information, see Configuring an IKE Policy.
The IKE tunnel profile specifies all the information needed to complete the IKE negotiation. Each protocol has its own statement hierarchy within the client statement to configure protocol-specific attribute value pairs, but only one client configuration is allowed for each profile. The following is the configuration at the [edit access] hierarchy level; for more information on access profiles, see the JUNOS System Basics Configuration Guide.
- profile profile-name {
-
- client * {
-
- ike {
-
- allowed-proxy-pair {
- remote remote-proxy-address local local-proxy-address;
- }
- pre-shared-key [ascii-text key-string] [hexadecimal key-string];
- ike-policy policy-name;
- interface-id <string-value>;
- }
- }
- }
![]() |
Note: For dynamic peers, the JUNOS software supports the IKE main mode with either the preshared key method of authentication or an IKE access profile that uses a local digital certificate.
|
The following statements make up the IKE profile:
By default, remote 0.0.0.0/0 local 0.0.0.0/0 is used if no values are configured. Both IPv4 and IPv6 address formats are supported in this configuration, but there are no default IPv6 addresses. You must specify even 0::0/0.