[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Defining the IPsec Protocols
The Security Policy area appears on the right,
and the Authentication (Phase 1) icon and Key Exchange (Phase 2) icon
appear in the Network Security Policy list, as shown in Figure 128.
Figure 128: Security Policy

Figure 129 shows the Algorithims
Area page.
Figure 129: Algorithms Area

Figure 130: IPsec Protocols Area

To define the Internet Protocol Security (IPsec)
protocols for securing the VPN tunnel:
- Double-click Security Policy in the Network Security
Policy list.
- Select Aggressive Mode in the Security Policy
area.
- Select Enable Perfect Forward Secrecy (PFS).
PFS allows generation of a new encryption key that is independent
from and unrelated to the preceding key.
- In the PFS Key Group drop-down list, select Diffie-Hellman
Group 2.
- In the Security Policy List (left panel), select Authentication
(Phase 1). Proposal 1 appears below the Authentication (Phase
1) icon.
- Select Proposal 1 to display the Authentication
Method and Algorithms area, as shown in Figure 126.
- Select Pre-Shared Key; Extended Authentication from the Authentication Method. This allows you to use XAuth.
 |
Note:
XAuth must also be enabled on the J-series router
running JUNOS software. XAuth allows password-prompt
authentication in addition to a preshared key. If enabled, you are
prompted for a password when initiating a VPN. See Configuring an Access Profile for XAuth and Configuring an IKE Gateway for more information on
configuring XAuth.
|
- In the Authentication and Algorithms area, define the
Encryption Algorithm AES-128 and the Hash Algorithm SHA-1. See Table 75 for brief descriptions of these
protocols.
- From the Key Group drop-down list, select Diffie-Hellman
Group 2.
- In the left panel, double-click the Key Exchange Phase
(2) icon. Proposal 1 appears below the icon.
- Select Proposal 1 to display
the IPsec Protocols area as shown in Figure 130.
- In the IPsec Protocols area, define the SA Life (the lifetime of the security association) in either seconds or bytes,
or leave it as Unspecified.
 |
Note:
Unspecified lifetimes (Phase I and II) cause the
NetScreen-Remote client to accept the values proposed by the router.
|
- Select Encapsulation Protocol (ESP). ESP provides
encryption, authentication, and an integrity check for IP datagrams.
- Select the encryption algorithm AES-128, the
hash algorithm SHA-1, and Tunnel.for the encapsulation
 |
Note:
If you select the Connect using Secure Gateway
Tunnel check box when defining Remote Party Identity and Addressing,
the encapsulation method must be Tunnel—no other option
is available.
|
- Click Save in the toolbar, or choose Save
Changes from the File menu.
The configuration for the NetScreen-Remote end
of an eventual VPN tunnel using a preshared key is complete.
Table 75: Encryption and Hash Algorithms
|
DES
|
Data Encryption Standard. A cryptographic block algorithm with
a 56-bit key.
|
|
Triple DES
|
A more powerful version of DES in which the original DES algorithm
is applied in three rounds, using a 168-bit key.
|
|
AES protocols
|
Advanced encryption standard. These protocols provide maximum
security for the key. The higher the AES value, the more secure the
key is. AES values can be AES-128, the least secure, AES-192, medium
security, and AES-256, the most secure.
|
|
MD5
|
Message Digest version 5. An algorithm that produces a 128-bit
message digest or hash from a message of arbitrary length. The resulting
hash is used, like a fingerprint of the input, to verify authenticity.
|
|
SHA-1
|
Secure Hash Algorithm-1. An algorithm that produces a 160-bit
hash from a message of arbitrary length. SHA-1 is generally regarded
as more secure than MD5 because of the larger hashes it produces.
|
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]