ike (Security IPsec VPN)
Syntax
ike {
anti-replay-window-size anti-replay-window-size;
gateway gateway-name;
idle-time seconds;
install-interval seconds;
ipsec-policy ipsec-policy-name;
no-anti-replay;
proxy-identity {
local ip-prefix;
remote ip-prefix;
service (any | service-name);
}
}
Hierarchy Level
[edit security ipsec vpn vpn-name]
Description
Define an IKE-keyed IPsec VPN.
Options
| anti-replay-window-size | To enable the
|
| gateway-name | Name of the remote IKE gateway. |
| idle-time | Specify the maximum amount of idle time to delete a security association (SA) when there is no traffic flow.
|
| install-interval | Specify the maximum number of seconds to allow the installation of a rekeyed outbound security association (SA) on the device.
|
| ipsec-policy | Specify the IPsec policy name. |
| no-anti-replay | Disable the antireplay checking feature of IPsec. Antireplay is an IPsec feature that can detect when a packet is intercepted and then replayed by attackers. By default, antireplay checking is enabled. |
| proxy-identity | Optionally specify the IPsec proxy ID to use in negotiations. The default is the identity based on the IKE gateway. If the IKE gateway is an IPv6 site-to-site gateway, the default proxy ID is ::/0. If the IKE gateway is an IPv4 gateway or a dynamic endpoint or dialup gateway, the default proxy ID is 0.0.0.0/0.
|
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 8.5. Support.
Statement anti-replay-window-size is introduced in Junos OS Release
19.2R1.
Support for idle-time and install-interval options
with IPsec VPN running iked process is added in Junos OS Release 23.4R1.