proposal (Security IKE)
Syntax
proposal proposal-name {
authentication-algorithm (md5 | sha-256 | sha-384 | sha1 | sha-512);
authentication-method (certificates | digital-signature | dsa-signatures | ecdsa-signatures-256 | ecdsa-signatures-384 | ecdsa-signatures-521 | pre-shared-keys | rsa-signatures | ecdsa-signatures-521);
description description;
dh-group (group1 | group14 | group19 | group2 | group20 | group24 | group5 | group15 | group16 | group21);
encryption-algorithm (3des-cbc | aes-128-cbc | aes-128-gcm | aes-192-cbc | aes-256-cbc | aes-256-gcm | chacha20-poly1305 | des-cbc);
lifetime-seconds seconds;
Signature Hash Algorithm (Security IKE) (sha1 | sha256 | sha384 | sha512);
}
Hierarchy Level
[edit security ike]
Description
Define an IKE proposal.
Options
| proposal-name |
Name of the IKE proposal. The proposal name can be up to 32 alphanumeric characters long. |
| authentication-algorithm |
Configure the Internet Key Exchange (IKE) authentication hash algorithm that authenticates packet data. It can be one of the following algorithms:
The device deletes existing IPsec SAs when you update the
|
| authentication-method |
Specify the method the device uses to authenticate the source of Internet
Key Exchange (IKE) messages. The
|
| description description |
Text the description of IKE proposal. |
| dh-group |
Specify the IKE Diffie-Hellman group. |
| encryption-algorithm |
Configure an encryption algorithm for an IKE proposal. |
| lifetime-seconds seconds |
Specify the lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated.
|
| signature-hash-algorithm |
(Optional) Specify the digital signature hash algorithms for IKEv2. Note that you cannot use the option with IKEv1. |
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement modified in Junos OS Release 8.5.
Support for dh-group group 14 and dsa-signatures
added in Junos OS Release 11.1.
Support for sha-384, ecdsa-signatures-256,
ecdsa-signatures-384, group19,
group20, and group24 options added in Junos OS
Release 12.1X45-D10.
Support for ecdsa-signatures-256 and
ecdsa-signatures-384 options added in Junos OS Release
12.1X45-D10.
Support for sha-512, group15,
group16, group21, and
ecdsa-signatures-521 options added in Junos OS Release 19.1R1
on SRX5000 line of devices with junos-ike package installed.
Support for authentication algorithm (SH1: hmac-sha1-96) added to vSRX Virtual Firewall in Junos OS Release 19.3R1 for Power Mode IPSec mode, along with the existing support in normal mode.
Support for group15, group16, and
group21 options added in Junos OS Release 20.3R1 on vSRX
Virtual Firewall instances with junos-ike package installed.
Support for group15, group16, and
group21 options added in Junos OS Release 21.1R1 on vSRX
Virtual Firewall 3.0 instances with junos-ike package
installed.
Support for certificates option added in Junos OS Release 22.4R1 on
MX240, MX480, and MX960 in USF mode, SRX1500, SRX4200, SRX4600, SRX5400, SRX5600,
SRX5800, and vSRX 3.0 running the iked process.
Support for the chacha20-poly1305 option added to SRX1600, SRX2300,
SRX4120, SRX4300, SRX4600, SRX5400, SRX5600, SRX5800, and vSRX 3.0 in Junos OS
Release 24.2R1.
Support for the digital-signature and
signature-hash-algorithm options added in Junos OS Release
24.4R1.
We've deprecated support for md5 and sha1 in
authentication-algorithm, des-cbc and
3des-cbc in encryption-algorithm, and
group1, group2 and group5 in
dh-group starting in Junos OS Release
25.2R1.