On the Services Router, you create service sets that define IPSec-specific information to configure IPSec. When you configure a service set for IPSec, you must configure:
![]() |
You can configure Internet Key Exchange (IKE) gateway IP addresses that are present in a VPN routing and forwarding (VRF) instance as long as the peer is reachable through the VRF instance. For next-hop service sets, the key management process (kmd) places the IKE packets in the routing instance that contains the outside-service-interface value you specify. For interface service sets, the service-interface (the interface on which the service set is applied) determines the VRF. |
This configuration allows you to set the remote gateway address and perform IKE validation on all incoming traffic through the IPSec tunnel.
The sample service set configuration in Table 36 configures the IPSec service set ipsec-dynamic, sets the local gateway to 10.90.90.2, sets the inside services interface to sp-0/0/0.1001, sets the outside services interface (facing the remote IPSec site) to sp-0/0/0.2001, and configures the service set to use the IPSec rule ipsec-dynamic-rule defined in Table 34.
The IPSec configuration also includes an IPSec proposal and policy, which this sample configuration does not demonstrate. If you do not explicitly configure an IPSec proposal and policy, the default values are used.
To configure interface service sets:
Table 36: Configuring Interface Service Sets