Example: Configuring an IPsec Phase 2 Proposal (CLI)
When configuring Phase 2 of an IPsec tunnel, you first configure proposals, then policies, and finally the AutoKey IKE. The following example-based instructions show how to create the initial proposal.
In Phase 2 proposal configuration, you must create a proposal, specify a security protocol, and select authentication and encryption algorithms for the traffic that will flow through the tunnel. In this example, you create a proposal called ipsec_prop_1, specify ESP as the security protocol, and set hmac-md5-96 as the authentication algorithm and 3des-cbc as the encryption algorithm. You also specify that the security association (SA) terminates after 1,800 KB of data pass through it.
To configure an IPsec Phase 2 proposal using the CLI editor:
Use the following command to display information about this IKE proposal:
Related Topics
- Junos OS Feature Support Reference for SRX Series and J Series Devices
- Understanding Phase 2 of IKE Tunnel Negotiation
- IPsec VPN Configuration Overview
Hide Navigation Pane
Show Navigation Pane
Download
SHA1