Navigation
Table of Contents
Guide That Contains This Content
[+] Expand All
[-] Collapse All
Configuring IPSec Conditions (SRC CLI)
You can configure IPSec conditions for Junos OS policy rules. Use the following configuration statements to add IPSec conditions to a classify-traffic condition:
policies group name list name rule name traffic-condition name ipsec-condition
{spi spi ;ip-flags ip-flags ; ip-flags-mask ip-flags-mask ; fragment-offset fragment-offset ; packet-length packet-length ; protocol protocol ; protocol-operation protocol-operation; }
To add IPSec conditions to a classify-traffic condition:
- From configuration mode, enter the IPSec configuration.
For example: user@host# edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition
- (Optional) Specify the authentication header (AH) or the
encapsulating security payload (ESP) security parameter index (SPI). [edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition]user@host# set spi spi
- (Optional) Configure the value of the IP flags field in
the IP header.[edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition]user@host# set ip-flags ip-flags
- (Optional) Configure the mask that is associated with
the IP flag.[edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition]user@host# set ip-flags-mask ip-flags-mask
- (Optional) Configure the value of the fragment offset
field. [edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition]user@host# set fragment-offset fragment-offset
- (Optional) Configure the packet length on which to match.
The length refers only to the IP packet, including the packet header,
and does not include any layer 2 encapsulation overhead. [edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition]user@host# set packet-length packet-length
- Configure the protocol matched by this classify-traffic
condition.[edit policies group vpn list input rule pr traffic-condition ctc ipsec-conditionuser@host# set protocol protocol
- (Optional) Verify the IPSec condition configuration.
[edit policies group vpn list input rule pr traffic-condition ctc ipsec-condition user@host# show spi 2; ip-flags 0; ip-flags-mask 0; fragment-offset 0; packet-length packetLength; protocol ah; protocol-operation 1;