[Prev][Next][Report an Error]

Configuring an IPsec Phase 2 Proposal—J-Web Quick Configuration (Standard VPNs)

You can use J-Web Quick Configuration to quickly configure IPsec phase 2 proposals.

Before You Begin

For background information, read

  • "Internet Protocol Security (IPsec)" chapter in the JUNOS Software Security Configuration Guide.

To configure an IPsec Phase 2 proposal with J-Web Quick Configuration:

  1. Select Configure>IPSec VPN>IPSec AutoKey .
  2. Select the Proposal tab.
  3. You can use an existing proposal when you configure your policy or you can create a new one by clicking Add.
  4. Fill in the options as described in Table 163.
  5. Click one of the following buttons:

Table 163: IPsec Phase 2 Proposal Options




IPsec Proposal (Phase 2)


Description of the Phase 2 proposal.

Enter a name.


Identify the proposal

Enter a text description.

Authentication algorithm

Hash algorithm that authenticates packet data. It can be one of the following:

  • hmac-md5-96—Produces a 128-bit digest.
  • hmac-sha1-96—Produces a 160-bit digest.

Select a hash algorithm.

Encryption algorithm

Configures an IKE encryption algorithm.

  • 3des-cbc—Has a block size of 24 bytes; the key size is 192 bits long.
  • des-cbc—Has a block size of 8 bytes; the key size is 48 bits long.
  • aes-128-cbc—AES 128-bit encryption algorithm.
  • aes-192-cbc—AES 192-bit encryption algorithm.
  • aes-256-cbc—AES 256-bit encryption algorithm.

Select an encryption algorithm.

Lifetime kilobytes

The lifetime (in kilobytes) of an IPsec security association (SA). The SA is terminated when the specified number of kilobytes of traffic have passed.

Enter a value from 64 through 1,048,576 bytes.


Lifetime seconds

The lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated.

Enter a value from 180 through 86,400 seconds.


The type of security protocol.

Select a protocol for the proposal.

[Prev][Next][Report an Error]