Defining IKE Policy Rules for IPSec Tunnels
This section describes enhancements to some IKE policy rule commands to support dynamic IPSec subscribers.
Specifying a Virtual Router for an IKE Policy Rule
The ip address virtual-router command enables an IKE policy rule to limit its scope to a specific local IP address on a specific virtual router. When enabled, this limitation ensures that this policy rule is evaluated for IKE security association evaluations for only the specified IP address and virtual router.
When initiating and responding to an IKE SA exchange, the router evaluates the possible policy rules as follows:
- If an IP-address-specific IKE policy rule refers to the local IP address and virtual router for this exchange, the router evaluates this policy rule before any non-IP-address-specific IKE policy rules. If more than one IP-address-specific IKE policy rule exists, the router evaluates the policy rule with the lowest priority number first and then evaluates the policy rule with the next highest priority number and so on.
- If no IP-address-specific IKE policy rule refers to the local IP address and virtual router for this exchange, the router evaluates all non-IP-address-specific IKE policy rules in the normal IKE policy rule evaluation order.
You can define an IKE policy rule without specifying an IP address or virtual router (the default). When not specifically configured, the IKE policy rule remains valid for any local IP address on any virtual router residing on the router.
ip address virtual-router
- Use to limit the scope of the IKE policy rule to the specified local IP address on the specified virtual router. This limitation ensures that this policy rule is evaluated for IKE security association evaluations for only the specified IP address and virtual router.
- Examplehost1(config-ike-policy)#ip address virtual-router VR1
- Use the no version to remove the IP address and virtual router limitation.
- See ip address virtual-router.
Defining Aggressive Mode for an IKE Policy Rule
The aggressive-mode command enables aggressive mode negotiation for the tunnel. For additional information about aggressive mode and how it works, see Main Mode and Aggressive Mode .
aggressive-mode
- Use to enable aggressive mode negotiation for the tunnel.
- If you specify aggressive mode negotiation, the tunnel proposes aggressive mode to the peer in connections that the policy initiates.
- If the peer initiates a negotiation, the tunnel accepts the negotiation if the mode matches this policy.
- Use the accepted keyword to accept aggressive mode when proposed by peers
- Use the requested keyword to request aggressive mode when negotiating with peers
- Use the required keyword to only request and accept aggressive mode when negotiating with peers.
- Examplehost1(config-ike-policy)#aggressive-mode accepted
- Use the no version to set the negotiation mode to main mode.
- See aggressive-mode.
Hide Navigation Pane
Show Navigation Pane
SHA1