
JunosE 11.3.x IP Services Configuration Guide
Copyright and Trademark Information
Table of Contents
List of Figures
List of Tables
About the Documentation
Chapters
Configuring Routing Policy
Configuring NAT
Overview
Platform Considerations
References
NAT Configurations
Network and Address Terms
Understanding Address Translation
Address Assignment Methods
Order of Operations
PPTP and GRE Tunneling Through NAT
Packet Discard Rules
Before You Begin
Configuring a NAT License
Limiting Translation Entries
Specifying Inside and Outside Interfaces
Defining Static Address Translations
Defining Dynamic Translations
Clearing Dynamic Translations
NAT Configuration Examples
Tunnel Configuration Through NAT Examples
GRE Flows Through NAT
Monitoring NAT
Configuring J-Flow Statistics 
Configuring BFD 
Configuring IPSec
Configuring Dynamic IPSec Subscribers 
Overview
Platform Considerations
References
Creating an IPSec Tunnel Profile 
Configuring IPSec Tunnel Profiles
Limiting Interface Instantiations on Each Profile 
Specifying IKE Settings
Appending a Domain Suffix to a Username
Overriding IPSec Local and Peer Identities for SA Negotiations
Specifying an IP Profile for IP Interface Instantiations
Defining the Server IP Address
Specifying Local Networks
Defining IPSec Security Association Lifetime Parameters
Defining User Reauthentication Protocol Values
Specifying IPSec Security Association Transforms
Specifying IPSec Security Association PFS and DH Group Parameters
Defining the Tunnel MTU
Defining IKE Policy Rules for IPSec Tunnels
Monitoring IPSec Tunnel Profiles
Configuring ANCP 
Overview
Platform Considerations
References
Configuring ANCP
Configuring ANCP Interfaces
Configuring ANCP Neighbors
Configuring Topology Discovery
Configuring ANCP for QoS Adaptive Mode
Triggering ANCP Line Configuration
Adjusting the Data Rate Reported by ANCP for DSL Lines
Configuring Transactional Multicast for IGMP
Triggering ANCP OAM
Monitoring ANCP
Configuring Digital Certificates
Overview
Platform Considerations
References
IKE Authentication with Digital Certificates 
IKE Authentication Using Public Keys Without Digital Certificates
Configuring Digital Certificates Using the Offline Method
Configuring Digital Certificates Using the Online Method
Configuring Peer Public Keys Without Digital Certificates
Monitoring Digital Certificates and Public Keys 
Configuring IP Tunnels 
Configuring Dynamic IP Tunnels 
IP Reassembly for Tunnels
Securing L2TP and IP Tunnels with IPSec 
Overview 
Platform Considerations
References 
L2TP/IPSec Tunnels
Setting Up the Secure L2TP Connection
L2TP with IPSec Control and Data Frames 
Compatibility and Requirements
NAT Passthrough Mode
NAT Traversal
Single-Shot Tunnels
Configuration Tasks for Client PC
Configuration Tasks for E Series Routers
Enabling IPSec Support for L2TP
Configuring NAT-T
Configuring Single-Shot Tunnels
GRE/IPSec and DVMRP/IPSec Tunnels
Configuring IPSec Transport Profiles 
Monitoring DVMRP/IPSec, GRE/IPSec, and L2TP/IPSec Tunnels
Configuring the Mobile IP Home Agent 
IndexA
B
C
D
- dead peer detection., See DPD
- default-information originate command
- destination profiles
- configuring
- monitoring 1, 2
- destruct timeout period for single-shot tunnels
- digital certificates
- authenticating the peer
- base64
- CA hierarchy
- certificate chains
- checking CRLs
- configuring
- file extensions
- generating private/public key pairs
- monitoring
- obtaining a public key certificate
- obtaining a root CA certificate
- obtaining public keys without 1, 2
- offline configuration
- offline enrollment
- online configuration
- online enrollment
- overview
- signature authentication
- standards
- viewing 1, 2, 3, 4
- X.509v3
- documentation set
- DPD (dead peer detection)
- DVMRP (Distance Vector Multicast Routing Protocol)
- dvmrp destination profile command
- DVMRP with IPSec
- dynamic IP tunnels
- dynamic tunnels
E
F
G
H
- home agent, Mobile IP., See Mobile IP home agent
I
- idle timeout period for single-shot tunnels
- IKE (Internet Key Exchange)
- aggressive mode characteristics
- aggressive mode negotiations
- authentication without digital certificates 1, 2
- initiator proposals and policy rules
- main mode characteristics
- overview
- SA negotiation
- using digital certificates
- IKE commands
- IKE message notification type
- IKE policies
- instance, route map
- interface commands
- interfaces
- internet community, BGP
- Internet Key Exchange., See IKE
- invalid cookies, IPSec
- IP
- IP addresses
- ip commands
- ip as-path access-list
- ip bgp-community new-format
- ip community-list
- ip prefix-list 1, 2
- ip prefix-tree 1, 2, 3
- ip refresh-route
- ip route
- ip tunnel reassembly
- IP flow
- IP fragmentation
- ip mobile commands, See also show ip mobile commands
- ip nat commands, See also show ip nat commands
- IP reassembly of tunnel packets
- IP security policies
- IP tunnels
- configuring
- monitoring 1, 2
- IP-in-IP tunnels 1, 2
- IPSec (IP Security), See also L2TP with IPSec
- AH
- AH processing
- concepts
- configuration
- configuring
- digital certificates
- encapsulation modes
- encapsulation protocols
- ESP
- ESP processing
- invalid cookies
- L2TP with IPSec 1, 2
- license
- monitoring
- overview
- packet encapsulation
- protocol stack
- reassembly of tunnel packets
- remote access 1, 2
- secure IP interfaces
- security parameters
- security parameters per policy type
- tunnel destination endpoint
- tunnel failover 1, 2
- tunnel source endpoint
- IPSec CA identity commands
- ipsec certificate commands
- ipsec commands, See also show ipsec commands
- ipsec ca authenticate
- ipsec ca enroll
- ipsec ca identity
- ipsec clear
- ipsec crl 1, 2
- ipsec identity
- ipsec ike-policy-rule
- ipsec isakmp-policy-rule
- ipsec key generate 1, 2, 3
- ipsec key manual pre-share
- ipsec key pubkey-chain rsa
- ipsec key zeroize 1, 2
- ipsec lifetime
- ipsec local-endpoint
- ipsec option dpd
- ipsec option nat-t
- ipsec option tx-invalid-cookie
- ipsec transform-set
- key
- masked-key
- IPSec identity commands
- IPSec IKE policy commands
- IPSec security parameters
- in relation to IPSec interface
- inbound SAs 1, 2
- lifetime
- lifetime for user SAs
- manual versus signaled
- negotiating transforms
- operational VR
- outbound SAs 1, 2
- per IPSec policy type
- perfect forward secrecy (PFS) 1, 2
- transform combinations supported
- transform sets 1, 2
- transforms supported
- transport VR 1, 2
- IPSec transport local profile commands
- IPSec transport profile commands, See also show ipsec transport commands
- IPSec tunnel profile commands
- IPSec tunnel profiles
- IPv6
J
K
- keepalive messages, NAT-T
- key-string command
- keys, public
- displaying on router
- format of
- obtaining without digital certificates 1, 2
L
- L2C (Layer 2 Control), See ANCP (Access Node Control Protocol)
- L2F, reassembly of tunnel packets
- L2TP (Layer 2 Tunneling Protocol)
- l2tp commands
- l2tp destination profile 1, 2
- l2tp ignore-receive-data-sequencing
- L2TP with IPSec
- client software supported
- compatibility
- configuring
- client PC
- E Series router 1, 2
- IPSec transport profiles
- L2TP destination profiles 1, 2
- single-shot tunnels
- control and data frames
- group preshared key
- how it works
- LNS change of port
- monitoring
- NAT interactions
- overview 1, 2
- references
- requirements
- setting up secure connection
- troubleshooting
- tunnel creation
- with PPP
- license commands
- lifetime, IPSec 1, 2
- limiting translation entries
- local-as community, BGP
- loopback interfaces 1, 2
M
- manual IPSec interfaces
- manuals
- map tag, route map
- match commands
- and route maps
- match as-paths
- match community
- match distance
- match extcommunity 1, 2
- match ip address 1, 2, 3, 4, 5
- match ip next-hop 1, 2, 3, 4, 5
- match level
- match metric
- match metric-type
- match policy-list
- match route-type
- match tag
- match-set summary prefix-tree 1, 2, 3
- max-interfaces command
- Mobile IP home agent, See also ip mobile commands
- MTU (maximum transmission unit)
N
- NAT (Network Address Translation)
- access list rules, creating
- address pools, defining
- address translation
- bidirectional
- configuration examples
- configuration types
- configuring
- dynamic address translation, defining
- dynamic inside source translation, creating
- dynamic outside source translation, creating
- interfaces, specifying inside and outside
- license
- monitoring
- NAT-T
- overview
- passthrough mode
- references
- static address translation, defining
- terms
- timeouts, defining
- translation entries, limiting
- translation rules, defining
- translations, clearing
- NAT-T (Network Address Translation Traversal)
- neighbor commands
- neighbor distribute-list
- neighbor filter-list 1, 2
- neighbor prefix-list
- neighbor prefix-tree
- neighbor send-community
- Network Address Translation Traversal., See NAT-T
- Network Address Translation., See NAT
- network prefixes, filtering
- next-hop routers
- setting or redistributing routes for
- setting/redistributing routes for 1, 2
- no-advertise community, BGP
- no-export community, BGP
- no-export-subconfed community, BGP
- notice icons
- null interface
O
P
- peer public keys
- displaying on router
- obtaining without digital certificates 1, 2
- perfect forward secrecy
- policy list
- prefix lists
- prefix trees
- prefixes
- preventing recursive tunnels
- profile commands
- public keys
- displaying on router
- format of
- obtaining without digital certificates 1, 2
Q
R
- recursive tunnels, preventing
- redistribute command
- redistribution policy (IP), monitoring
- redundancy
- regular expressions and routing policy
- RIP (Routing Information Protocol)
- route maps
- route-map command
- routing policy
- routing policy, BGP
- access lists 1, 2
- monitoring 1, 2
- route maps
- routing table
- routing, IP, See also IP
S
- secure IP interfaces
- security parameters
- sequence number, route map
- Service Modules., See SMs
- set commands
- shared tunnel-server ports 1, 2, 3, 4, 5, 6
- show access-list command
- show adjustment-factor command
- show bfd session command
- show dvmrp commands
- show gre commands
- show ike commands
- show ike policy-rule
- show ike sa 1, 2
- show ip commands
- show ip as-path-access-list
- show ip cache flow
- show ip cache flow aggregation
- show ip community-list
- show ip extcommunity-list
- show ip prefix-list
- show ip prefix-list detail
- show ip prefix-list summary
- show ip prefix-tree
- show ip prefix-tree detail
- show ip prefix-tree summary
- show ip protocols
- show ip redistribute
- show ip route
- show ip route slot
- show ip static
- show ip traffic
- show ip tunnel reassembly statistics
- show ip flow sampling command 1, 2
- show ip match-policy-list command
- show ip mobile commands, See also ip mobile commands
- show ip nat commands
- show ip nat inside rule
- show ip nat outside rule
- show ip nat statistics
- show ip nat translations 1, 2
- show ipsec commands
- show ike certificates
- show ike configuration
- show ike identity
- show ipsec ca identity
- show ipsec certificates
- show ipsec identity 1, 2
- show ipsec ike-configuration
- show ipsec ike-policy-rule
- show ipsec ike-sa 1, 2
- show ipsec key mypubkey rsa
- show ipsec key pubkey-chain rsa
- show ipsec lifetime
- show ipsec local-endpoint
- show ipsec option 1, 2
- show ipsec transform-set
- show ipsec tunnel detail
- show ipsec tunnel summary
- show ipsec tunnel virtual-router
- show license ipsec-tunnels
- show ipsec transport commands
- show ipv6 commands
- show l2c commands
- show l2c
- show l2c label
- show l2c neighbor
- show l2c statistics 1, 2
- show l2tp commands
- show license commands
- show route-map command
- single-shot tunnels
- single-shot-tunnel command
- SMs (Service modules)
- source, tunnel
- static routes 1, 2
- static tunnels
- statistics, tunnel reassembly
- subscriber management
- support, technical, See technical support
T
- table-map command
- technical support
- text and syntax conventions
- timeout periods for single-shot tunnels
- traffic, IP
- transform sets, IPSec
- transport network
- troubleshooting
- tunnel commands
- tunnel commands, IP
- tunnel checksum 1, 2
- tunnel destination 1, 2
- tunnel mtu
- tunnel sequence-datagrams
- tunnel source 1, 2
- tunnel commands, IPSec
- tunnel-server ports
- tunnels, IP
- tunnels, IPSec monitoring
- tunnels, single-shot
U
W
X