IP Tunnel Command Reference

Command Hierarchies

Configuration Commands

Hardware Commands

config
— card slot-number
— mda mda-slot
mda-type isa-tunnel
— no mda-type

ISA Commands

config
isa
tunnel-group tunnel-group-id [create]
— no tunnel-group tunnel-group-id
active-mda-number [1..16]
backup mda-id
— no backup
description description-string
mda mda-id
[no] mda
primary mda-id
— no primary
reassembly [wait-msecs]
— no reassembly
[no] shutdown

IPSec Commands

config
ipsec
cert-profile profile-name [create]
— no cert-profile profile-name
entry entry-id [create]
— no entry entry-id
cert cert-filename
— no cert
key key-filename
— no key
[no] send-chain
[no] send-chain
[no] shutdown
trust-anchor-profile name [create]
trust-anchor ca-profile-name
ts-list list-name [create]
— no ts-list list-name
local
entry entry-id [create]
— no entry entry-id
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
— no address
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
— no protocol
remote
entry entry-id [create]
— no entry entry-id
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
— no address
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
— no protocol
config
ipsec
ike-policy ike-policy-id [create]
— no ike-policy ike-policy-id
auth-algorithm auth-algorithm
auth-method {psk | plain-psk-xauth | cert-auth | psk-radius | cert-radius | eap | auto-eap-radius}
auto-eap-method {psk | cert | psk-or-cert}
auto-eap-own-method {psk | cert}
description description-string
dh-group {1 2 | 5 | 14 | 15}
— no dh-group
dpd [interval interval] [max-retries max-retries] [reply-only]
— no dpd
encryption-algorithm {des | 3des | aes128 | aes192 | aes256}
ike-mode {main | aggressive}
— no ike-mode
ike-version {1 | 2}
ipsec-lifetime ipsec-lifetime
isakmp-lifetime isakmp-lifetime
lockout failed-attempts count duration duration-minutes block block-minutes [max-port-per-ip number-of-ports]
— no lockout
nat-traversal [force] [keep-alive-interval keep-alive-interval] [force-keep-alive]
own-auth-method {psk | cert | eap-only}
pfs [dh-group {1 | 2 | 5 | 14 | 15}]
— no pfs
config
ipsec
ipsec-transform transform-id [create]
— no ipsec-transform transform-id
esp-auth-algorithm {null | md5 | sha1| sha256 | sha384 | sha512| aes-xcbc}
esp-encryption-algorithm {null | des | 3des | aes128 | aes192 | aes256}
config
ipsec
[no] static-sa sa-name
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash|hash2]
description description-string
direction ipsec-direction
— no direction
protocol ipsec-protocol
— no protocol
spi spi
— no spi
config
ipsec
tunnel-template ipsec template identifier [create]
— no tunnel-templateipsec template identifier
[no] clear-df-bit
description description-string
pkt-too-big interval seconds message-count count
ip-mtu octets
— no ip-mtu
replay-window {32 | 64 | 128 | 256 | 512}
transform transform-id [transform-id...(up to 4 max)]
— no transform
config
ipsec
radius-accounting-policy name [create]
[no] nas-ip-addr
[no] nas-port-id
radius-server-policy radius-server-policy-name
update-interval minutes [jitter seconds]
[no] nas-ip-addr
[no] nas-port-id
password password [hash | hash2]
— no password
radius-server-policy radius-server-policy-name

Service Configuration Commands

IES Commands

config
— service
— ies service-id [customer customer-id] [vpn vpn-id]
[no] interface ip-int-name [tunnel]
[no] sap sap-id [create]
ip-tunnel ip-tunnel-name [create]
backup-remote-ip ip-address
[no] clear-df-bit
delivery-service {service-id | svc-name}
description description-string
dscp dscp-name
— no dscp
[no] dest-ip ip-address
gre-header send-key send-key receive-key receive-key
— no gre-header
ip-mtu octets
— no ip-mtu
reassembly [wait-msecs]
— no reassembly
remote-ip ip-address
— no remote-ip
[no] shutdown
source ip-address
— no source
[no] ipsec-gw
cert
cert filename
— no cert
cert-profile profile
key filename
— no key
default-result {revoked | good}
primary {ocsp | crl}
— no primary
secondary {ocsp | crl}
— no secondary
trust-anchor ca-profile-name
trust-anchor-profile profile-name
trust-anchor ca-profile-name
trust-anchor-profile profile-name
default-secure-service service-id ipsec-interface ip-int-name
default-tunnel-template ipsec template identifier
[no] dhcp
gi-address ip-address
— no gi-address
[no] send-release
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
— no server
[no] shutdown
[no] dhcp6
link-address ip-address
[no] send-release
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
— no server
[no] shutdown
ike-policy ike-policy-id
— no ike-policy
ipv4
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
ipv6
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
[no] shutdown
local-gateway-address ip-address
local-id type {ipv4 | fqnd | ipv6} [value [255 chars max]]
— no local-id
pre-shared-key key [{hash | hash2}]
radius-accounting-policy policy-name
[no] shutdown
ts-negotiation ts-list list-name

VPRN Commands

config
— service
— vprn service-id [customer customer-id]
— no vprn service-id
ipsec
security-policy security-policy-id [create]
— no security-policy security-policy-id
entry entry-id [create]
— no entry entry-id
local-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
local-v6-ip ipv6-prefix/prefix-length
local-v6-ip any
remote-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
remote-v6-ip any
remote-v6-ip ipv6-prefix/prefix-length
[no] interface ip-int-name
— ipv6
address ipv6-address/prefix-length [eui-64] [preferred] [track-srrp srrp-instance]
— no address ipv6-address/prefix-length
link-local-address ipv6-address [preferred]
config
— service
— vprn service-id [customer customer-id]
— no vprn service-id
[no] interface ip-int-name [create] [tunnel]
[no] sap sap-id [create]
ip-tunnel ip-tunnel-name [create]
backup-remote-ip ip-address
[no] clear-df-bit
delivery-service {service-id | svc-name}
description description-string
dscp dscp-name
— no dscp
[no] dest-ip ip-address
[no] gre-header
ip-mtu octets
— no ip-mtu
reassembly [wait-msecs]
— no reassembly
remote-ip ip-address
— no remote-ip
[no] shutdown
source ip-address
— no source
[no] ipsec-gw
cert
cert filename
— no cert
cert-profile profile
key filename
— no key
default-result {revoked | good}
primary {ocsp | crl}
— no primary
secondary {ocsp | crl}
— no secondary
trust-anchor ca-profile-name
trust-anchor-profile profile-name
default-secure-service service-id ipsec-interface ip-int-name
default-tunnel-template ipsec template identifier
[no] dhcp
gi-address ip-address
— no gi-address
[no] send-release
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
— no server
[no] shutdown
[no] dhcp6
link-address ip-address
[no] send-release
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
— no server
[no] shutdown
ike-policy ike-policy-id
— no ike-policy
ipv4
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
ipv6
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
[no] shutdown
local-gateway-address ip-address
local-id type {ipv4 | fqdn | ipv6} [value [255 chars max]]
— no local-id
pre-shared-key key [{hash | hash2}]
[no] shutdown
ts-negotiation ts-list list-name
ipsec-tunnel ipsec-tunnel-name [create]
— no ipsec-tunnel ipsec-tunnel-name
[no] bfd-designate
bfd-enable service service-id interface interface-name dst-ip ip-address
[no] clear-df-bit
description description-string
[no] dest-ip ip-address
cert
cert filename
— no cert
cert-profile profile
key filename
— no key
default-result {revoked | good}
primary {ocsp | crl}
— no primary
secondary {ocsp | crl}
— no secondary
trust-anchor ca-profile-name
trust-anchor-profile profile-name
ike-policy ike-policy-id
— no ike-policy
local-id type {ipv4 | fqdn | ipv6} [value [255 chars max]]
— no local-id
pre-shared-key key [{hash | hash2}]
transform transform-id [transform-id...(up to 4 max)]
— no transform
pkt-too-big interval seconds message-count count
ip-mtu octets
— no ip-mtu
local-gateway-address ip-address peer ip-address delivery-service service-id
local-id type type [value <[255 chars max]>
— no local-id
[no] manual-keying
security-association security-entry-id authentication-key authentication-key encryption-key encryption-key spi spi transform transform-id direction {inbound | outbound}
— no security-association security-entry-id direction {inbound | outbound}
replay-window replay-window-size
security-policy security-policy-id

IPSec Mastership Election Commands

These commands are applicable to the 7750 SR.

configure
— redundancy
peer ip-address [create]
— no peer ip-address
[no] mc-ipsec
[no] bfd-enable
discovery-interval interval-secs [boot interval-secs]
keep-alive-interval interval
tunnel-group tunnel-group-id [create]
— no tunnel-group tunnel-group-id
peer-group tunnel-group-id
— no peer-group
priority priority
— no priority
[no] shutdown

Related Commands

config
— router
— policy-options
— policy-statement
— entry
— from
protocol protocol [all | instance instance]
— no protocol
state state
— no state
config
— redundancy
— multi-chassis
— peer
— sync
[no] ipsec
tunnel-group tunnel-group-id sync-tag tag-name [create]
— no tunnel-group tunnel-group-id

CMPv2 Commands

config
— system
— security
pki
certificate-display-format {ascii | utf8}
ca-profile name [create]
— no ca-profile name
cmpv2
http-version [1.0 | 1.1]
key password [hash | hash2] reference reference-number
— no key reference reference-number
url url-string [service-id service-id]
— no url
revocation-check {crl | crl-optional}
admin
cmpv2
cert-request ca ca-profile-name current-key key-filename current-cert cert-filename [hash-alg hash-algorithm] newkey key-filename subject-dn subject-dn [domain-name <[255 chars max]> [ip-addr <ip-address | ipv6-address>] save-as save-path-of-result-cert
clear-request ca ca-profile-name
initial-registration ca ca-profile-name key-to-certify key-filename protection-alg {password password reference ref-number | signature [cert cert-file-name [send-chain [with-ca ca-profile-name]]] [protection-key key-file-name] [hash-alg {md5 | sha1 | sha224 | sha256 | sha384 | sha512}]} subject-dn dn [domain-name <[255 chars max]> [ip-addr <ip-address|ipv6-address>] save-as save-path-of-result-cert
key-update ca ca-profile-name newkey key-filename oldkey key-filename oldcert cert-filename [hash-alg hash-algorithm] save-as save-path-of-result-cert
poll ca ca-profile-name
show-request [ca ca-profile-name]

Auto-Update Commands

config
— system
file-transmission-profile name [create]
ipv4-source-address ip-address
ipv6-source-address ipv6-address
redirection [1..8]
retry count
— no retry
router router-instance
timeout seconds
config
— system
— security
pki
ca-profile name [create]
— no ca-profile name
auto-crl-update [create]
url-entry entry-id [create]
— no url-entry entry-id
file-transmission-profile profile-name
url url
— no url
periodic-update-interval [days days] [hrs hours] [min minutes] [sec seconds]
pre-update-time [days days] [hrs hours] [min minutes] [sec seconds]
retry-interval seconds
pre-update-time schedule-type
schedule-type schedult-type
[no] shutdown
admin
crl-update ca ca-profile-name

Show Commands

show
— ipsec
cert-profile name association
cert-profile [name]
cert-profile name entry [1..8]
certificate filename association
gateway name name
gateway [service service-id]
gateway tunnel [ip-address:port]
gateway name name tunnel ip-address:port
gateway name name tunnel
gateway [name name] tunnel state state
gateway [name name] tunnel idi-value idi-prefix
gateway tunnel count
ike-policy ike-policy-id
lockout router router-id local-gateway-address local-gateway-address mda mda
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
lockout router router-id mda mda
security-policy service-id [security-policy-id]
static-sa name sa-name
static-sa spi spi
transform [transform-id]
trust-anchor-profile trust-anchor-profile association
trust-anchor-profile [trust-anchor-profile ]
ts-list [list-name]
ts-list list-name association
ts-list list-name local-entry [1..32]
ts-list list-name remote-entry [1..32]
ts-list list-name {local | remote}
tunnel ipsec-tunnel-name
tunnel
tunnel-template [ipsec template identifier]
— redundancy
— multi-chassis
mc-ipsec peer ip-address tunnel-group tunnel-group-id
mc-ipsec peer ip-address

Debug Commands

debug
— ipsec
[no] certificate filename
gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]] [detail] [no-dpd-debug]
— no gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]]
gateway name name tunnel-subnet ip-prefix/ip-prefix-length [port port] [detail] [no-dpd-debug]
— no gateway name name tunnel-subnet ip-prefix/ip-prefix-length
tunnel ipsec-tunnel-name [detail]
— no tunnel ipsec-tunnel-name
cmpv2
[no] ca-profile profile-name
ocsp

Tools Commands

tools
— perform
— redundancy
— multi-chassis
force-switchover tunnel-group local-group-id [now][to {master | standby}]
— ipsec
ike-initiate tunnel-group-id ipsec-group-id
ike-initiate tunnel-name ipsec-tunnel-name

Clear Commands

clear
— ipsec
lockout router router-id
lockout router router-id local-gateway-address local-gateway-address
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]

Command Descriptions

Generic Commands

description

Syntax 
description description-string
Context 
config>isa>ipsec-group
config>isa
Description 

This command creates a text description which is stored in the configuration file to help identify the content of the entity.

The no form of the command removes the string from the configuration.

Default 

none

Parameters 
string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.

shutdown

Syntax 
[no] shutdown
Context 
config>isa
config>isa>aa-group
config>isa>tunnel-grp
config>ipsec>cert-profile
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
config>service>ies>if>sap>ipsec-gateway>dhcp
config>service>ies>if>sap>ipsec-gateway>dhcp6
config>service>vprn>if>sap>ipsec-gateway>dhcp
config>service>vprn>if>sap>ipsec-gateway>dhcp6
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description 

This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command.

The shutdown command administratively disables an entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.

Hardware Commands

mda-type

Syntax 
mda-type isa-tunnel
no mda-type
Context 
config>card>mda
Description 

This command provisions or de-provisions an MDA to or from the device configuration for the slot.

Parameters 
isa-tunnel—
Specifies the ISA tunnel.

ISA Commands

isa

Syntax 
isa
Context 
config
Description 

This command enables the context to configure Integrated Services Adapter (ISA) parameters.

tunnel-group

Syntax 
tunnel-group tunnel-group-id [create]
no tunnel-group tunnel-group-id
Context 
config>isa
Description 

This command allows a tunnel group to be created or edited. A tunnel group is a set of one or more MS-ISAs that support the origination and termination of IPSec and IP/GRE tunnels. All of the MS-ISAs in a tunnel group must have isa-tunnel as their configured mda-type.

The no form of the command deletes the specified tunnel group from the configuration

Parameters 
tunnel-group-id—
An integer value that uniquely identifies the tunnel-group.
Values—
1—16
create—
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled/disabled in the environment>create context.

active-mda-number

Syntax 
active-mda-number number
no active-mda-number
Context 
config>isa>tunnel-grp
Description 

This command specifies the number of active MS-ISA within all configured MS-ISA in the tunnel-group with multi-active enabled. IPsec traffic will be load balanced across all active MS-ISAs. If the number of configured MS-ISA is greater than the active-mda-number then the delta number of MS-ISA will be backup.

Default 

no

Parameters 
number—
Specifies the number of active MDAs.
Values—
1—16

backup

Syntax 
backup mda-id
no backup
Context 
config>isa>tunnel-grp
Description 

This command assigns an ISA IPSec module configured in the specified slot to this IPSec group. The backup module provides the IPSec group with warm redundancy when the primary module in the group is configured. An IPSec group must always have a primary configured.

Primary and backup modules have equal operational status and when both modules are coming up, the one that becomes operational first becomes the active module. An IPSec module can serve as a backup for multiple IPSec groups but the backup can become active for only one ISA IPSec group at a time.

All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPSec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.

The operator is notified through SNMP events when:

  1. When the ISA IPSec service goes down (all modules in the group are down) or comes back up (a module in the group becomes active).
  2. When ISA IPSec redundancy fails (one of the modules in the group is down) or recovers (the failed module comes back up).
  3. When an ISA IPSec activity switch took place.

The no form of the command removes the specified module from the IPSec group.

Default 

no backup

Parameters 
mda-id—
Specifies the card/slot identifying a provisioned module to be used as a backup module.
Values—
mda-id: slot/mda slot 1 — up to 10 depending on chassis model mda 1 — 2

mda

Syntax 
mda mda-id
no mda
Context 
config>isa>tunnel-grp
Description 

This command specifies the MDA id of the MS-ISA as the member of tunnel-group with multi-active enabled. Up to 16 MDA could be configured under the same tunnel-group.

Default 

no

Parameters 
mda-id—
Specifies the id of MS-ISA.
Values—
iom-slot-id/mda-slot-id

multi-active

Syntax 
[no] multi-active
Context 
config>isa>tunnel-grp
Description 

This command enables configuring multiple active MS-ISA in the tunnel-group. IPsec traffic will be load balanced to configured active MS-ISAs.

Operational notes:

  1. A shutdown of group and removal of all existing configured tunnels of the tunnel-group are needed before provisioning command “multi-active”.
  2. If the tunnel-group is admin-up with “multi-active” configured then the configuration of “primary” and “backup” are not allowed.
  3. The active-mda-number must be =< total number of ISA configured.
    1. If active-mda-number is less than total number of ISA configured then the delta number of ISA will become backup ISA.
Default 

no

primary

Syntax 
primary mda-id
no primary
Context 
config>isa>tunnel-grp
Description 

This command assigns an ISA IPSec module configured in the specified slot to this IPSec group. The backup ISA IPSec provides the IPSec group with warm redundancy when the primary ISA IPSec in the group is configured. Primary and backup ISA IPSec have equal operational status and when both MDAs are coming up, the one that becomes operational first becomes the active ISA IPSec.

All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPSec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.

The operator is notified through SNMP events when:

  1. When the ISA IPSec service goes down (all modules in the group are down) or comes back up (a module in the group becomes active).
  2. When ISA IPSec redundancy fails (one of the modules in the group is down) or recovers (the failed module comes back up).
  3. When an ISA IPSec activity switch took place.

The no form of the command removes the specified primary ID from the group’s configuration.

Default 

no primary

Parameters 
mda-id —
Specifies the card/slot identifying a provisioned IPSec ISAA.

reassembly

Syntax 
reassembly [wait-msecs]
no reassembly
Context 
config>isa>tunnel-group
config>service>ies>interface>sap>gre-tunnel
config>service>vprn>interface>sap>gre-tunnel
Description 

This command configures IP packet reassembly for IPSec and GRE tunnels supported by an MS-ISA. The reassembly command at the tunnel-group level configures IP packet reassembly for all IPSec and GRE tunnels associated with the tunnel-group. The reassembly command at the GRE tunnel level configures IP packet reassembly for that one specific GRE tunnel, overriding the tunnel-group configuration.

The no form of the command disables IP packet reassembly.

Default 

no reassembly (tunnel-group level)

reassembly (gre-tunnel level)

Parameters 
wait —
Specifies the maximum number of milliseconds that the ISA tunnel application will wait to receive all fragments of a particular IPSec or GRE packet. If one or more fragments are still missing when this limit is reached the partially reassembled datagram is discarded and an ICMP time exceeded message is sent to the source host (if allowed by the ICMP configuration of the sending interface). Internally, the configured value is rounded up to the nearest multiple of 100 ms.
Values—
100 — 5000
Values—
2000 (tunnel-group level)

Certificate Profile Commands

cert-profile

Syntax 
cert-profile profile-name [create]
no cert-profile profile-name
Context 
config>ipsec
Description 

This command creates a new cert-profile or enters the configuration context of an existing cert-profile.

The no form of the command removes the profile name from the cert-profile configuration.

Default 

none

Parameters 
profile-name—
Specifies the name of the certification profile up to 32 characters in length.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>ipsec>cert-profile
Description 

This command configures the certificate profile entry information

The no form of the command removes the entry-id from the cert-profile configuration.

Default 

none

Parameters 
entry-id—
Specifies the entry ID.
Values—
1 — 8

cert

Syntax 
cert cert-filename
no cert
Context 
config>ipsec>cert-profile>entry
Description 

This command specifies the file name of an imported certificate for the cert-profile entry.

The no form of the command removes the cert-file-name from the entry configuration.

Default 

none

key

Syntax 
key key-filename
no key
Context 
config>ipsec>cert-profile>entry
Description 

This command specifies the filename of an imported key for the cert-profile entry.

The no form of the command removes the key-filename from the entry configuration.

Default 

none

Parameters 
key-filename—
Specifies the filename of an imported key.

send-chain

Syntax 
[no] send-chain
Context 
config>ipsec>cert-profile>entry
Description 

This command enters the configuration context of send-chain in the cert-profile entry.

The configuration of this command is optional, by default system will only send the certificate specified by cert command in the selected entry to the peer. This command allows system to send additional CA certificates to the peer. These additional CA certificates must be in the certificate chain of the certificate specified by the cert command in the same entry.

ca-profile

Syntax 
[no] ca-profile name
Context 
config>ipsec>cert-profile>entry>send-chain
Description 

This command specifies a CA certificate in the specified ca-profile to be sent to the peer.

Multiple configurations (up to seven) of this command are allowed in the same entry.

Default 

none

Parameters 
name—
Specifies the profile name up to 32 characters in length.

Internet Key Exchange (IKE) Commands

ipsec

Syntax 
ipsec
Context 
config
Description 

This command enables the context to configure Internet Protocol security (IPSec) parameters. IPSec is a structure of open standards to ensure private, secure communications over Internet Protocol (IP) networks by using cryptographic security services.

trust-anchor

Syntax 
trust-anchor profile-name
Context 
config>ipsec
Description 

This command specifies a ca-profile as a trust-anchor CA. multiple trust-anchors (up to 8) could be specified in a single trust-anchor-profile.

Parameters 
profile-name—
The name of ca-profile.

ike-policy

Syntax 
ike-policy ike-policy-id [create]
no ike-policy ike-policy-id
Context 
config>ipsec
Description 

This command enables the context to configured an IKE policy.

The no form of the command

Parameters 
ike-policy-id—
Specifies a policy ID value to identify the IKE policy.
Values—
1 — 2048

auth-algorithm

Syntax 
auth-algorithm auth-algorithm
no auth-algorithm
Context 
config>ipsec>ike-policy
Description 

The command specifies which hashing algorithm to use for the IKE authentication function.

The no form of the command removes the parameter from the configuration.

Parameters 
md5—
Specifies the hmac-md5 algorithm for authentication.
sha1—
Specifies the hmac-sha1 algorithm for authentication.
sha256—
Specifies the sha256 algorithm for authentication.
sha384—
Specifies the sha384 algorithm for authentication.
sha512—
Specifies the sha512 algorithm for authentication.
aes-xcbc—
Specifies the aes-xcbc algorithm for authentication.

auth-method

Syntax 
auth-method {psk | plain-psk-xauth | cert-auth | psk-radius | cert-radius | eap | auto-eap-radius}
no auth-method
Context 
config>ipsec>ike-policy
Description 

This command specifies the authentication method used with this IKE policy.

The no form of the command removes the parameter from the configuration.

Default 

no auth-method

Parameters 
psk—
Both client and gateway authenticate each other by a hash derived from a pre-shared secret. Both client and gateway must have the PSK. This work with both IKEv1 and IKEv2
plain-psk-xauth—
Both client and gateway authenticate each other by pre-shared key and RADIUS. This work with IKEv1 only.
psk-radius—
Use the pre-shared-key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
cert-radius—
Use the certificate, public/private key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
eap—
Use the EAP to authenticate peer. IKEv2 remote-access tunnel only
auto-eap-radius—
Use EAP or potentially other method to authenticate peer. IKEv2 remote-access tunnel only. Also see auto-eap-method and auto-eap-own-method.

auto-eap-method

Syntax 
auto-eap-method {psk | cert | psk-or-cert}
Context 
config>ipsec>ike-policy
Description 

This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:

  1. If there is no AUTH payload in IKE_AUTH request, then system use EAP to authenticate client and also will own-auth-method to generate AUTH payload.
  2. If there is AUTH payload in IKE_AUTH request:
    1. if auto-eap-method is psk, then system proceed as auth-method:psk-radius
    2. if auto-eap-method is cert, then system proceed as auth-method:cert-radius
    3. if auto-eap-method is psk-or-cert, then:
      1. if the "Auth Method" field of AUTH payload is PSK, then system proceed as auth-method:psk-radius
      2. if the "Auth Method" field of AUTH payload is RSA or DSS, then system proceed as auth-method:cert-radius
  3. The system will use auto-eap-own-method to generate AUTH payload.

This command only applies when auth-method is configured as auto-eap-radius.

Default 

auto-eap-method cert

Parameters 
psk—
Uses the pre-shared-key as the authentication method.
cer—
Uses the certificate as the authentication method.
psk-or-cert —
Uses either the pre-shared-key or certificate based on the “Auth Method” field of the received AUTH payload.

auto-eap-own-method

Syntax 
auto-eap-own-method {psk | cert}
Context 
config>ipsec>ike-policy
Description 

This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:

  1. If there is no AUTH payload in IKE_AUTH request, then system use EAP to authenticate client and also will own-auth-method to generate AUTH payload.
  2. If there is AUTH payload in IKE_AUTH request:
    1. if auto-eap-method is psk,then system proceed as auth-method:psk-radius.
    2. if auto-eap-method is cert, then system proceed as auth-method:cert-radius.
    3. if auto-eap-method is psk-or-cert, then:
      1. if the "Auth Method" field of AUTH payload is PSK, then system proceed as auth-method:psk-radius.
      2. if the "Auth Method" field of AUTH payload is RSA or DSS, then system proceed as auth-method:cert-radius.
  3. The system will use auto-eap-own-method to generate AUTH payload.

This command only applies when auth-method is configured as auto-eap-radius.

Default 

auto-eap-method cert

Parameters 
psk—
Uses a pre-shared-key to generate AUTH payload.
cert—
Uses a public/private key to generate AUTH payload.

dh-group

Syntax 
dh-group {1 | 2 | 5 | 14 | 15}
no dh-group
Context 
config>ipsec>ike-policy
Description 

This command specifies which Diffie-Hellman group to calculate session keys. Three groups are supported with IKE-v1:

  1. Group 1: 768 bits
  2. Group 2: 1024 bits
  3. Group 5: 1536 bits
  4. Group 14: 2048 bits
  5. Group 15: 3072 bits

More bits provide a higher level of security, but require more processing.

Default 

5

The no form of the command removes the Diffie-Hellman group specification.

dpd

Syntax 
dpd [interval interval] [max-retries max-retries] [reply-only]
no dpd
Context 
config>ipsec>ike-policy
Description 

This command controls the dead peer detection mechanism.

The no form of the command removes the parameters from the configuration.

Parameters 
interval interval
Specifies the interval that will be used to test connectivity to the tunnel peer. If the peer initiates the connectivity check before the interval timer it will be reset.
Values—
10 — 300 seconds
Values—
30
max-retries max-retries
Specifies the maximum number of retries before the tunnel is removed.
Values—
2 — 5
Values—
3
reply-only—
Specifies to only reply to DPD keepalives. Issuing the command without the reply-only keyword disables the behavior.
Values—
reply-only

encryption-algorithm

Syntax 
encryption-algorithm {des | 3des | aes128 | aes192 | aes256}
no encryption-algorithm
Context 
config>ipsec>ike-policy
Description 

This command specifies the encryption algorithm to use for the IKE session.

The no form of the command removes the encryption algorithm from the configuration.

Default 

aes128

Parameters 
des—
This parameter configures the 56-bit des algorithm for encryption. This is an older algorithm, with relatively weak security. While better than nothing, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des—
This parameter configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations for more security.
aes128—
This parameter configures the aes algorithm with a block size of 128 bits. This is the mandatory impelmentation size for aes.
aes192—
This parameter configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256—
This parameter configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.

ike-mode

Syntax 
ike-mode {main | aggressive }
no ike-mode
Context 
config>ipsec>ike-policy
Description 

This command specifies one of either two modes of operation. IKE version 1 can support main mode and aggressive mode. The difference lies in the number of messages used to establish the session.

The no form of the command removes the mode of operation from the configuration.

Default 

main

Parameters 
main—
Specifies identity protection for the hosts initiating the IPSec session. This mode takes slightly longer to complete.
aggresive—
Aggressive mode provides no identity protection but is faster.

ike-version

Syntax 
ike-version {1 | 2}
no ike-version
Context 
config>ipsec>ike-policy
Description 

This command sets the IKE version (1 or 2) that the ike-policy will use.

Default 

1

Parameters 
1 | 2—
The version of IKE protocol.

ipsec-lifetime

Syntax 
ipsec-lifetime ipsec-lifetime
no ipsec-lifetime
Context 
config>ipsec>ike-policy
Description 

This parameter specifies the lifetime of a phase two SA.

The no form of the command reverts the ipsec-lifetime value to the default.

Default 

3600 (1 hour)

Parameters 
ipsec-lifetime—
specifies the lifetime of the phase two IKE key in seconds.
Values—
1200 — 172800

isakmp-lifetime

Syntax 
isakmp-lifetime isakmp-lifetime
no isakmp-lifetime
Context 
config>ipsec>ike-policy
Description 

This command specifies the lifetime of a phase one SA. ISAKMP stands for Internet Security Association and Key Management Protocol

The no form of the command reverts the isakmp-lifetime value to the default.

Default 

86400

Parameters 
isakmp-lifetime—
Specifies the lifetime of the phase one IKE key in seconds.
Values—
1200 — 172800

lockout

Syntax 
lockout failed-attempts count duration duration-minutes block block-minutes [max-port-per-ip number-of-ports]
no lockout
Context 
config>ipsec>ike-policy
Description 

This command enables the lockout mechanism for the IPSec tunnel. The system will lock out an IPSec client for the configured time interval if the number of failed authentications exceeds the configured value within the specified duration. This command only applies when the system acts as a tunnel responder.

A client is defined as the tunnel IP address plus the port.

Optionally, the max-port-per-ip parameter can be configured as the maximum number of ports allowed behind the same IP address. If this threshold is exceeded, then all ports behind the IP address are blocked.

The no form of this command disables the lockout mechanism.

Default 

n/a

Parameters 
count—
The maximum number of failed authentications allowed during the duration-minutes interval
Values—
1 to 64
Values—
3
duration-minutes—
The interval of time, in minutes, during which the configured failed authentication count must be exceeded in order to trigger a lockout
Values—
1 to 60
Values—
5
block-minutes—
The number of minutes that the client is blocked if the configured failed authentication count is exceeded
Values—
1 to 1440 | infinite
Values—
10
number-of-ports—
The maximum number of ports allowed behind the same IP address
Values—
1 to 32000
Values—
16

match-peer-id-to-cert

Syntax 
[no] match-peer-id-to-cert
Context 
config>ipsec>ike-policy
Description 

This command enables checking the IKE peer's ID matches the peer's certificate when performing certificate authentication.

nat-traversal

Syntax 
nat-traversal [force] [keep-alive-interval keep-alive-interval] [force-keep-alive]
no nat-traversal
Context 
config>ipsec>ike-policy
Description 

This command specifies whether NAT-T (Network Address Translation Traversal) is enabled, disabled or in forced mode.

The no form of the command reverts the parameters to the default.

Default 

none

Parameters 
force—
Forces to enable NAT-T.
keep-alive-interval keep-alive-interval
Specifies the keep-alive interval.
Values—
10 — 3600 seconds
force-keep-alive—
When specified, the keep-alive does not expire.

own-auth-method

Syntax 
own-auth-method {psk | cert | eap-only}
no own-auth-method
Context 
config>ipsec>ike-policy
Description 

This command configures the authentication method used with this IKE policy on its own side.

pfs

Syntax 
pfs [dh-group {1 | 2 | 5 | 14 | 15}]
no pfs
Context 
config>ipsec>ike-policy
Description 

This command enables perfect forward secrecy on the IPSec tunnel using this policy. PFS provides for a new Diffie-hellman key exchange each time the SA key is renegotiated. After that SA expires, the key is forgotten and another key is generated (if the SA remains up). This means that an attacker who cracks part of the exchange can only read the part that used the key before the key changed. There is no advantage in cracking the other parts if they attacker has already cracked one.

The no form of the command disables PFS. If this it turned off during an active SA, when the SA expires and it is time to re-key the session, the original Diffie-hellman primes will be used to generate the new keys.

Default 

15

Parameters 
dh-group {1 | 2 | 5 14 | 15} —
Specifies which Diffie-hellman group to use for calculating session keys. More bits provide a higher level of security, but require more processing. Three groups are supported with IKE-v1:

Group   1: 768 bits

Group   2: 1024 bits Group 5:

Group 14: 2048 bits

Group 15: 3072 bits

relay-unsolicited-cfg-attribute

Syntax 
relay-unsolicited-cfg-attribute
Context 
config>ipsec>ike-policy
Description 

This command enters relay unsolicited configuration attributes context. With this configuration, the configured attributes returned from source (such as a RADIUS server) will be returned to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

internal-ip4-dns

Syntax 
[no] internal-ip4-dns
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv4 DNS server address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

internal-ip4-netmask

Syntax 
[no] internal-ip4-netmask
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv4 netmask from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

internal-ip6-dns

Syntax 
[no] internal-ip6-dns
Context 
config>ipsec>ike-policy>relay-unsol-attr
Description 

This command will return IPv6 DNS server address from source (e.g. RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.

static-sa

Syntax 
[no] static-sa sa-name
Context 
config>ipsec
Description 

This command configures an IPSec static SA.

direction

Syntax 
direction ipsec-direction
no direction
Context 
config>ipsec>static-sa
Description 

This command configures the direction for an IPSec manual SA.

The no form of the command reverts to the default value.

Default 

bidirectional

Parameters 
ipsec-direction—
Identifies the direction to which this static SA entry can be applied.
Values—
inbound, outbound, bidirectional

protocol

Syntax 
protocol ipsec-protocol
no protocol
Context 
config>ipsec>static-sa
Description 

This command configures the security protocol to use for an IPSec manual SA. The no statement resets to the default value.

Default 

esp

Parameters 
ipsec-protocol—
Identifies the IPSec protocol used with this static SA.
Values—
ah — Specifies the Authentication Header protocol. esp — Specifies the Encapsulation Security Payload protocol.

authentication

Syntax 
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash|hash2]
no authentication
Context 
config>ipsec>static-sa
Description 

This command configures the authentication algorithm to use for an IPSec manual SA.

The no form of the command reverts to the default value.

Default 

sha1

Parameters 
ascii-key—
Specifies an ASCII key.
hex-key—
Specifies a HEX key.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

spi

Syntax 
spi spi
no spi
Context 
config>ipsec>static-sa
Description 

This command configures the SPI key value for an IPSec manual SA.

This command specifies the SPI (Security Parameter Index) used to lookup the instruction to verify and decrypt the incoming IPSec packets when the value of the direction command is inbound.

The SPI value specifies the SPI that will be used in the encoding of the outgoing packets when the when the value of the direction command is outbound. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.

If no spi is selected, then this static SA cannot be used.

The no form of the command reverts to the default value.

Default 

none

Parameters 
spi—
Specifies the security parameter index for this SA.
Values—
256..16383

ipsec-transform

Syntax 
ipsec-transform transform-id [create]
Context 
config>ipsec
Description 

This command enables the context to create an ipsec-transform policy. IPSec transforms policies can be shared. A change to the ipsec-transform is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.

IPSec transform policy assignments to a tunnel require the tunnel to be shutdown.

The no form of the command removes the ID from the configuration.

Parameters 
transform-id—
Specifies a policy ID value to identify the IPSec transform policy.
Values—
1 — 2048
create—
Keyword that
create—
This keyword is mandatory when creating an ipsec-transform policy. The create keyword requirement can be enabled/disabled in the environment>create context.

esp-auth-algorithm

Syntax 
esp-auth-algorithm {null | md5 | sha1 | sha256 | sha384 | sha512 | aes-xcbc}
no esp-auth-algorithm
Context 
config>ipsec>transform
Description 

The command specifies which hashing algorithm should be used for the authentication function Encapsulating Security Payload (ESP). Both ends of a manually configured tunnel must share the same configuration parameters for the IPSec tunnel to enter the operational state.

The no form of the command disables the authentication.

Parameters 
null—
This is a very fast algorithm specified in RFC 2410, which provides no authentication.
md5—
This parameter configures ESP to use the hmac-md5 algorithm for authentication.
sha1—
This parameter configures ESP to use the hmac-sha1 algorithm for authentication.
sha256—
This parameter configures ESP to use the sha256 algorithm for authentication.
sha384—
This parameter configures ESP to use the sha384 algorithm for authentication.
sha512—
This parameter configures ESP to use the sha512 algorithm for authentication.
aes-xcbc—
Specifies the aes-xcbc algorithm for authentication.

esp-encryption-algorithm

Syntax 
esp-encryption-algorithm {null | des | 3des | aes128 | aes192 | aes256}
no esp-encryption-algorithm
Context 
config>ipsec>transform
Description 

This command specifies the encryption algorithm to use for the IPSec session. Encryption only applies to esp configurations. If encryption is not defined, esp will not be used.

For IPSec tunnels to come up, both ends need to be configured with the same encryption algorithm.

The no form of the command removes the specified encryption algorithm.

Default 

aes128

Parameters 
null—
This parameter configures the high-speed null algorithm, which does nothing. This is the same as not having encryption turned on.
des—
This parameter configures the 56-bit des algorithm for encryption. This is an older algorithm, with relatively weak security. Although slightly better than no encryption, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des—
This parameter configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations to make things more secure.
aes128—
This parameter configures the aes algorithm with a block size of 128 bits. This is the mandatory implementation size for aes. As of today, this is a very strong algorithm choice.
aes192—
This parameter configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256—
This parameter configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.

tunnel-template

Syntax 
tunnel-template ipsec template identifier [create]
no tunnel-template ipsec template identifier
Context 
config>ipsec
Description 

This command creates a tunnel template. Up to 2,000 templates are allowed.

Default 

none

Parameters 
ipsec template identifier—
Specifies the template identifier.
Values—
1 — 2048
create—
Mandatory keyword used when creating a tunnel-template in the IPSec context. The create keyword requirement can be enabled/disabled in the environment>create context.

clear-df-bit

Syntax 
[no] clear-df-bit
Context 
config>ipsec>tnl-temp
Description 

This command enables clearing of the Do-not-Fragment bit.

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>ipsec>tnl-temp
Description 

This command configures the template IP MTU.

Parameters 
octets —
Specifies the maximum size in octets.
Values—
512 — 9000

replay-window

Syntax 
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context 
config>ipsec>tnl-temp
Description 

This command sets the anti-replay window.

The no form of the command removes the parameter from the configuration.

Default 

no replay-window

Parameters 
{32 | 64 | 128 | 256 | 512}—
Specifies the size of the anti-replay window.

sp-reverse-route

Syntax 
[no] sp-reverse-route
Context 
config>ipsec>tnl-temp
Description 

This command specifies whether the node using this template will accept framed-routes sent by the RADIUS server and install them for the lifetime of the tunnel as managed routes.

The no form of the command disables sp-reverse-route.

Default 

no sp-reverse-route

transform

Syntax 
transform transform-id [transform-id...(up to 4 max)]
no transform
Context 
config>ipsec>tnl-temp
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures IPSec transform.

encapsulated-ip-mtu

Syntax 
encapsulated-ip-mtu octets
no encapsulated-ip-mtu
Context 
config>service>vprn>if>sap>ipsec-tun
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description 

This command specifies the max size of encapsulated tunnel packet for the ipsec-tunnel/ip-tunnel or the dynamic tunnels terminated on the ipsec-gw. If the encapsulated v4/v6 tunnel packet exceeds the encapsulated-ip-mtu, then system will fragment the packet against the encapsulated-ip-mtu.

Parameters 
octets—
Specifies the max size in octets.
Values—
512 — 9000

icmp6-generation

Syntax 
icmp6-generation
Context 
config>service>vprn>if>sap>ipsec-tun
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description 

This command enters ICMPv6 packet generation configuration context.

pkt-too-big

Syntax 
pkt-too-big interval seconds message-count count
pkt-too-big
no pkt-too-big
Context 
config>service>vprn>if>sap>ipsec-tun>icmp6-gen
config>ipsec>tnl-temp>icmp6-gen
config>service>vprn>if>sap>ip-tunnel>icmp6-gen
config>service>ies>if>sap>ip-tunnel>icmp6-gen
Description 

This command enables system to send ICMPv6 PTB (Packet Too Big) message on private side and optionally specifies the rate.

With this command configured, system will send PTB back if received v6 packet on private side is bigger than 1280 bytes and also exceeds the private MTU of the tunnel.

The ip-mtu command (under ipsec-tunnel or tunnel-template) specifies the private MTU for the ipsec-tunnel or dynamic tunnel.

Parameters 
seconds—
the maximum interval during which messages can be sent, in seconds
Values—
1 to 60
Values—
10
count—
the maximum number of ICMPv6 messages that can be sent during the configured interval
Values—
10 to 1000
Values—
100

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>ipsec>tnl-temp>
Description 

This command continues the template IP MTU.

IPSec Configuration Commands

ipsec

Syntax 
ipsec
Context 
config>service>vprn>ipsec
Description 

This command enables the context to configure IPSec policies.

Default 

none

cert-profile

Syntax 
cert-profile profile-name
no cert-profile
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command specifies the cert-profile for the ipsec-tunnel or ipsec-gw. This command will override cert and key configuration under the ipsec-tunnel or ipsec-gw.

Default 

none

Parameters 
profile-name—
Specifies the name of cert-profile.

security-policy

Syntax 
security-policy security-policy-id [create]
no security-policy security-policy-id
Context 
config>service>vprn>ipsec
Description 

This command configures a security policy to use for an IPSec tunnel.

Default 

none

Parameters 
security-policy-id—
specifies a value to be assigned to a security policy.
Values—
1 — 8192
create—
Keyword used to create the security policy instance. The create keyword requirement can be enabled/disabled in the environment>create context.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>service>vprn>ipsec>sec-plcy
Description 

This command configures an IPSec security policy entry.

Parameters 
entry-id—
Specifies the IPSec security policy entry.
Values—
1 — 16
create—
Keyword used to create the security policy entry instance. The create keyword requirement can be enabled/disabled in the environment>create context.

local-ip

Syntax 
local-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command configures the local (from the VPN) IP prefix/mask for the policy parameter entry.

Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.

Parameters 
ip-prefix—
The destination address of the aggregate route in dotted decimal notation.
Values—
a.b.c.d (host bits must be 0)
prefix-length   1 — 32
netmask—
The subnet mask in dotted decimal notation.
any—
keyword to specify that it can be any address.

local-v6-ip

Syntax 
local-v6-ip ipv6-prefix/prefix-length
local-v6-ip any
no local-v6-ip
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command specifies the local v6 prefix for the security-policy entry.

Parameters 
ipv6-prefix/prefix-length—
Specifies the local v6 prefix and length.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 — FFFF]H

d [0 — 255]D

host bits must be 0

:: not allowed

prefix-length [1..128]

any—
keyword to specify that it can be any address.

remote-ip

Syntax 
remote-ip ip-prefix/prefix-length | ip-prefix netmask | any}
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command configures the remote (from the tunnel) IP prefix/mask for the policy parameter entry.

Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.

Parameters 
ip-prefix—
The destination address of the aggregate route in dotted decimal notation.
Values—
a.b.c.d (host bits must be 0)
prefix-length   1 — 32
netmask—
The subnet mask in dotted decimal notation.
any—
keyword to specify that it can be any address.

remote-v6-ip

Syntax 
remote-v6-ip any
remote-v6-ip ipv6-prefix/prefix-length
no remote-v6-ip
Context 
config>service>vprn>ipsec>sec-plcy>entry
Description 

This command specifies the remote v6 prefix for the security-policy entry.

Parameters 
ipv6-prefix/prefix-length—
Specifies the local v6 prefix and length.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 — FFFF]H

d [0 — 255]D

host bits must be 0

:: not allowed

prefix-length [1..128]

any—
keyword to specify that it can be any address.

address

Syntax 
address ipv6-address/prefix-length [eui-64] [preferred] [track-srrp srrp-instance]
no address ipv6-address/prefix-length
Context 
config>service>vprn>if>ipv6
Description 

This command add an IPv6 address to the tunnel interface.

The prefix length must be 96 or higher.

Parameters 
ipv6-address/prefix-length—
Specifies the IPv6 address on the interface.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 — FFFF]H

d [0 — 255]D

prefix-length  

1 — 128

eui-64—
When the eui-64 keyword is specified, a complete IPv6 address from the supplied prefix and 64-bit interface identifier is formed. The 64-bit interface identifier is derived from MAC address on Ethernet interfaces. For interfaces without a MAC address, for example ATM interfaces, the Base MAC address of the chassis is used.
preferred—
specifies that the IPv6 address is the preferred IPv6 address for this interface. Preferred address is an address assigned to an interface whose use by upper layer protocols is unrestricted. Preferred addresses maybe used as the source (or destination) address of packets sent from (or to) the interface. Preferred address doesn’t go through the DAD process.

link-local-address

Syntax 
link-local-address ipv6-address [preferred]
Context 
config>service>vprn>if>ipv6
Description 

This command specifies the link-local-address for the tunnel interface.

Only one link-local-address is allowed per interface.

Parameters 
ipv6-address—
Specifies the IPv6 address on the interface.
Values—

ipv6-address/prefix: ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

  

x:x:x:x:x:x:d.d.d.d

  

x [0 — FFFF]H

d [0 — 255]D

preferred—
specifies that the IPv6 address is the preferred IPv6 address for this interface. Preferred address is an address assigned to an interface whose use by upper layer protocols is unrestricted. Preferred addresses maybe used as the source (or destination) address of packets sent from (or to) the interface. Preferred address doesn’t go through the DAD process.

dynamic-tunnel-redundant-next-hop

Syntax 
dynamic-tunnel-redundant-next-hop ip-address
no dynamic-tunnel-redundant-next-hop
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command configures the dynamic ISA tunnel redundant next-hop address.

Default 

no dynamic-tunnel-redundant-next-hop

Parameters 
ip-address—
Specifies the IP address of the next hop.

static-tunnel-redundant-next-hop

Syntax 
static-tunnel-redundant-next-hop ip-address
no static-tunnel-redundant-next-hop
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command specifies redundant next-hop address on public or private IPSec interface (with public or private tunnel-sap) for static IPSec tunnel. The specified next-hop address will be used by standby node to shunt IPSec traffic to master in case of it receives them.

The next-hop address will be resolved in routing table of corresponding service.

Default 

no static-tunnel-redundant-next-hop

Parameters 
ip-address—
Specifies the IP address of the next hop.

interface

Syntax 
interface ip-int-name [create] [tunnel]
no interface ip-int-name
Context 
config>service>vprn
Description 

This command creates a logical IP routing interface for a Virtual Private Routed Network (VPRN). Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.

The interface command, under the context of services, is used to create and maintain IP routing interfaces within VPRN service IDs. The interface command can be executed in the context of an VPRN service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber internet access.

Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config router interface and config service vprn interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.

The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on service IP interfaces. It also controls the prefixes that may be learned or statically defined with the service IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.

When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.

By default, there are no default IP interface names defined within the system. All VPRN IP interfaces must be explicitly defined. Interfaces are created in an enabled state.

The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shutdown before issuing the no interface command.

For VPRN services, the IP interface must be shutdown before the SAP on that interface may be removed. VPRN services do not have the shutdown command in the SAP CLI context. VPRN service SAPs rely on the interface status to enable and disable them.

Parameters 
ip-int-name—
Specifies the name of the IP interface. Interface names can be from 1 to 32 alphanumeric characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
Values—
1 — 32 characters maximum
tunnel—
Specifies that the interface is configured as tunnel interface, which could be used to terminate IPSec or GRE tunnels in the private service.
create—
Keyword used to create the IPSec interface instance. The create keyword requirement can be enabled/disabled in the environment>create context.

sap

Syntax 
sap sap-id [create]
no sap sap-id
Context 
config>service>ies>if
config>service>vprn>if
Description 

This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.

All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.

Enter an existing SAP without the create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.

A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports.

If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.

The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted.

Default 

No SAPs are defined.

Special Cases 
SAP Tunnels—
sap tunnel-id.private | public:tag — This parameter associates a tunnel group SAP with this interface.

This context will provide a SAP to the tunnel. The operator may associate an ingress and egress QoS policies as well as filters and virtual scheduling contexts. Internally this creates an Ethernet SAP that will be used to send and receive encrypted traffic to and from the MDA. Multiple tunnels can be associated with this SAP. The “tag” will be a dot1q value. The operator may see it as an identifier. The range is limited to 1 — 4094.

Parameters 
sap-id—
Specifies the physical port identifier portion of the SAP definition.
port-id—
Specifies the physical port ID in the slot/mda/port format.

If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number format. For example 61/2/3 specifies port 3 on MDA 2 in slot 61.

Table 24:  Port ID Syntax   

null

port-id | lag-id

dot1q

{port-id | lag-id}:{qtag1 | cp-conn-prof-id

qinq

{port-id | lag-id}:{qtag1 | cp-conn-prof-id}.{qtag2 | cp-conn-prof-id}

      cp: keyword

      conn-prof-id: 1..8000

port-id

slot/mda/port [.channel]

eth-sat-id

esat-id/slot/port

esat: keyword

id: 1 to20

pxc-id

psc-id.sub-port

pxc psc-id.sub-port

pxc: keyword

id: 1 to 64

sub-port: a, b

lag-id

lag-id

lag: keyword

id: 1 .. 800

qtag1

0..4094

qtag2

* | null | 0 .. 4094

The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.

If the SONET/SDH port is configured as clear-channel then only the port is specified.

create—
Keyword used to create a SAP instance.

ipsec-tunnel

Syntax 
ipsec-tunnel ipsec-tunnel-name [create]
no ipsec-tunnel ipsec-tunnel-name
Context 
config>service>vprn>if>sap
config>service>vprn>if>sap>ipsec-tun
Description 

This command specifies an IPSec tunnel name. An IPSec client sets up the encrypted tunnel across public network. The 7750 SR IPSec MDA acts as a concentrator gathering, and terminating these IPSec tunnels into an IES or VPRN service. This mechanism allows as service provider to offer a global VPRN service even if node of the VPRN are on an uncontrolled or insecure portion of the network.

Default 

none

Parameters 
ipsec-tunnel-name—
Specifies an IPSec tunnel name up to 32 characters in length.
create—
Keyword used to create the IPSec tunnel instance. The create keyword requirement can be enabled/disabled in the environment>create context.

bfd-designate

Syntax 
[no] bfd-designate
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command specifies whether this IPSec tunnel is the BFD designated tunnel.

Default 

none

bfd-enable

Syntax 
[no] bfd-enable service service-id interface interface-name dst-ip ip-address
Context 
config>service>vprn>if>tunnel
Description 

This command assign a BFD session provide heart-beat mechanism for given IPSec tunnel. There can be only one BFD session assigned to any given IPSec tunnel, but there can be multiple IPSec tunnels using same BFD session. BFD control the state of the associated tunnel, if BFD session goes down, system will also bring down the associated non-designated IPSec tunnel.

Default 

none

Parameters 
service service-id
Specifies where the service-id that the BFD session resides.
interface interface-name
Specifies the name of the interface used by the BFD session.
dst-ip ip-address
Specifies the destination address to be used for the BFD session.

dynamic-keying

Syntax 
[no] dynamic-keying
Context 
config>service>vprn>if>tunnel
Description 

This command enables dynamic keying for the IPSec tunnel.

Default 

none

auto-establish

Syntax 
[no] auto-establish
Context 
config>service>vprn>if>tunnel
Description 

This command specifies whether to attempt to establish a phase 1 exchange automatically.

The no form of the command disables the automatic attempts to establish a phase 1 exchange.

Default 

no auto-establish

transform

Syntax 
transform transform-id [transform-id...(up to 4 max)]
no transform
Context 
config>service>vprn>if>tunnel>dynamic-keying
Description 

This command associates the IPSec transform sets allowed for this tunnel. A maximum of four transforms can be specified. The transforms are listed in decreasing order of preference (the first one specified is the most preferred).

Default 

none

Parameters 
transform-id—
Specifies the value used for transforms for dynamic keying.
Values—
1 — 2048

manual-keying

Syntax 
[no] manual-keying
Context 
config>service>vprn>if>tunnel
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures Security Association (SA) for manual keying. When enabled, the command specifies whether this SA entry is created manually by the user or dynamically by the IPSec sub-system.

Default 

none

security-association

Syntax 
security-association security-entry-id authentication-key authentication-key encryption-key encryption-key spi spi transform transform-id direction {inbound | outbound}
no security-association security-entry-id direction {inbound | outbound}
Context 
config>service>vprn>if>tunnel>manual-keying
config>service>ies>if>sap>ipsec-gateway>manual-keying
config>service>vprn>if>sap>ipsec-gateway>manual-keying
Description 

This command configures the information required for manual keying SA creation.

Default 

none

Parameters 
security-entry-id—
Specifies the ID of an SA entry.
Values—
1 — 16
encryption-key encryption-key
specifies the key used for the encryption algorithm.
Values—
none or 0x0..0xFFFFFFFF...(max 64 hex nibbles)
authentication-key authentication-key
The authentication key.
Values—
none or 0x0..0xFFFFFFFF...(max 40 hex nibbles)
spi spi
Specifies the SPI (Security Parameter Index) used to look up the instruction to verify and decrypt the incoming IPSec packets when the direction is inbound. When the direction is outbound, the SPI that will be used in the encoding of the outgoing packets. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.
Values—
256 — 16383
transform transform-id
specifies the transform entry that will be used by this SA entry. This object should be specified for all the entries created which are manual SAs. If the value is dynamic, then this value is irrelevant and will be zero.
Values—
1 — 2048
direction {inbound | outbound}—
Specifies the direction of an IPSec tunnel.

replay-window

Syntax 
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context 
config>service>vprn>if>tunnel>manual keying
Description 

This command specifies the size of the anti-replay window. The anti-replay window protocol secures IP against an entity that can inject messages in a message stream from a source to a destination computer on the Internet.

Default 

none

Parameters 
{32 | 64 | 128 | 256 | 512}—
Specifies the size of the SA anti-replay window.

security-policy

Syntax 
security-policy security-policy-id
no security-policy
Context 
config>service>vprn>ipsec-if>tunnel
Description 

This command configures an IPSec security policy. The policy may then be associated with tunnels defined in the same context.

Default 

none

Parameters 
security-policy-id—
Specifies the IPSec security policy entry that the tunnel will use.
Values—
1 — 8192

Interface SAP Tunnel Commands

ip-tunnel

Syntax 
ip-tunnel ip-tunnel-name [create]
no ip-tunnel ip-tunnel-name
Context 
config>service>ies>sap
config>service>vprn>sap
Description 

This command is used to configure an IP-GRE or IP-IP tunnel and associate it with a private tunnel SAP within an IES or VPRN service.

The no form of the command deletes the specified IP/GRE or IP-IP tunnel from the configuration. The tunnel must be administratively shutdown before issuing the no ip-tunnel command.

Default 

no IP tunnels are defined.

Parameters 
ip-tunnel-name —
Specifies the name of the IP tunnel. Tunnel names can be from 1 to 32 alphanumeric characters. If the string contains special characters (for example, #, $, spaces), the entire string must be enclosed within double quotes.

source

Syntax 
source ip-address
no source
Context 
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the source IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. It must be an address in the subnet of the associated public tunnel SAP interface. The GRE tunnel does not come up until a valid source address is configured.

The no form of the command deletes the source address from the GRE tunnel configuration. The tunnel must be administratively shutdown before issuing the no source command.

Parameters 
ip-address—
Specifies the source IPv4 address of the GRE tunnel.
Values—
1.0.0.0 — 223.255.255.255

remote-ip

Syntax 
remote-ip ip-address
no remote-ip
Context 
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the primary destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If this address is reachable in the delivery service (there is a route) then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.

The no form of the command deletes the destination address from the GRE tunnel configuration.

Parameters 
ip-address—
Specifies the destination IPv4 address of the GRE tunnel.
Values—
1.0.0.0 — 223.255.255.255

backup-remote-ip

Syntax 
backup-remote-ip ip-address
no backup-remote-ip
Context 
config>service>interface>ies>sap>gre-tunnel
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the backup destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If the primary destination address is not reachable in the delivery service (there is no route) or not defined then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.

The no form of the command deletes the backup-destination address from the GRE tunnel configuration.

Parameters 
ip-address—
Specifies the destination IPv4 address of the GRE tunnel.
Values—
1.0.0.0 — 223.255.255.255

clear-df-bit

Syntax 
[no] clear-df-bit
Context 
config>service>vprn>interface>sap>ipsec-tunnel
config>service>vprn>interface>sap>gre-tunnel
config>service>ies>interface>sap>gre-tunnel
Description 

This command instructs the MS-ISA to reset the DF bit to 0 in all payload IP packets associated with the GRE or IPSec tunnel, before any potential fragmentation resulting from the ip-mtu command. (This will require a modification of the header checksum.) The no clear-df-bit command, corresponding to the default behavior, leaves the DF bit unchanged.

The no form of the command disables the DF bit reset.

Default 

none

delivery-service

Syntax 
delivery-service {service-id | svc-name}
no delivery-service
Context 
config>service>interface>ies>sap>delivery-service
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the delivery service for GRE encapsulated packets associated with a particular GRE tunnel. This is the IES or VPRN service where the GRE encapsulated packets are injected and terminated. The delivery service may be the same service that owns the private tunnel SAP associated with the GRE tunnel. The GRE tunnel does not come up until a valid delivery service is configured.

The no form of the command deletes the delivery-service from the GRE tunnel configuration.

Parameters 
service-id—
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel.
Values—
1—2147483648
svc-name—
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel.
Values—
1—64 characters

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description 

This command sets the DSCP code-point in the outer IP header of GRE encapsulated packets associated with a particular GRE tunnel. The default, set using the no form of the command, is to copy the DSCP value from the inner IP header (after remarking by the private tunnel SAP egress qos policy) to the outer IP header.

Default 

no dscp

Parameters 
dscp—
Specifies the DSCP code-point to be used.
Values—
be, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cs1, cp9, af11, cp11, af12, cp13, af13, cp15, cs2, cp17, af21, cp19, af22, cp21, af23, cp23, cs3, cp25, af31, cp27, af32, cp29, af33, cp31, cs4, cp33, af41, cp35, af42, cp37, af43, cp39, cs5, cp41, cp42, cp43, cp44, cp45, ef, cp47, nc1, cp49, cp50, cp51, cp52, cp53, cp54, cp55, nc2, cp57, cp58, cp59, cp60, cp61, cp62, cp63

dest-ip

Syntax 
dest-ip ip-address
Context 
config>service>ies>interface>sap>ip-tunnel
config>service>vprn>interface>sap>ip-tunnel
config>service>vprn>sap>ipsec-tunnel
Description 

This command configures a private IPv4 or IPv6 address of the remote tunnel endpoint. A tunnel can have up to 16 dest-ip commands. At least one dest-ip address is required in the configuration of a tunnel. A tunnel does not come up operationally unless all dest-ip addresses are reachable (part of a local subnet).

Unnumbered interfaces are not supported.

Default 

No default

Parameters 
ip-address —
Specifies the private IPv4 or IPv6 address of the remote IP tunnel endpoint. If this remote IP address is not within the subnet of the IP interface associated with the tunnel then the tunnel will not come up.
Values—

<ip-address>

ipv4-address

a.b.c.d

ipv6-address

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x - [0..FFFF]H

d - [0..255]D

gre-header

Syntax 
gre-header send-key send-key receive-key receive-key
Context 
config>service>ies>sap>ip-tunnel
config>service>vprn>sap>ip-tunnel
Description 

This command configures the type of the IP tunnel. If the gre-header command is configured then the tunnel is a GRE tunnel with a GRE header inserted between the outer and inner IP headers. If the no form of the command is configured then the tunnel is a simple IP-IP tunnel.

Default 

no gre-header

Parameters 
send-key send-key
Specifies a 32-bit unsigned integer.
Values—
0 — 4294967295
receive-key receive-key
Specifies a 32-bit unsigned integer.
Values—
0 — 4294967295

ip-mtu

Syntax 
ip-mtu octets
no ip-mtu
Context 
config>service>ies>if>sap>gre-tunnel
config>service>vprn>if>sap>gre-tunnel
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command configures the IP maximum transmit unit (packet) for this interface.

Because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.

The MTU that is advertized from the IES size is:

MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))

By default (for ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.

The ip-mtu command instructs the MS-ISA to perform IP packet fragmentation, prior to IPSec encryption and encapsulation, based on the configured MTU value. In particular:

If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is clear (due to the presence of the clear-df-bit command or because the original DF value was 0) then the MS-ISA fragments the payload packet as efficiently as possible (i.e. it creates the minimum number of fragments each less than or equal to the configured MTU size); in each created fragment the DF bit shall be 0.

If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is set (because the original DF value was 1 and the tunnel has no clear-df-bit in its configuration) then the MS-ISA discards the payload packet without sending an ICMP type 3/code 4 message back to the packet’s source address.

The no ip-mtu command, corresponding to the default behavior, disables fragmentation of IP packets by the MS-ISA; all IP packets, regardless of size or DF bit setting, are allowed into the tunnel.

The effective MTU for packets entering a tunnel is the minimum of the private tunnel SAP interface IP MTU value (used by the IOM) and the tunnel IP MTU value (configured using the above command and used by the MS-ISA). So if it desired to fragment IP packets larger than X bytes with DF set, rather than discarding them, the tunnel IP MTU should be set to X and the private tunnel SAP interface IP MTU should be set to a value larger than X.

Default 

no ip-mtu

reassembly

Syntax 
reassembly [wait-msecs]
no reassembly
Context 
config>service>ies>if>sap
Description 

This command configures the reassembly wait time.

IPSec Gateway Commands

ipsec-gw

Syntax 
[no] ipsec-gw
Context 
config>service>ies>if>sap
config>service>vprn>if>sap
Description 

This command configures an IPSec gateway.

default-secure-service

Syntax 
default-secure-service service-id ipsec-interface ip-int-name
no default-secure-service
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command specifies a service ID or service name of the default security service used by this SAP IPSec gateway.

Parameters 
service-id—
Specifies a default secure service.
Values—
service-id: 1 — 2147483648 svc-name: An existing service name up to 64 characters in length.

default-tunnel-template

Syntax 
default-tunnel-template ipsec template identifier
no default-tunnel-template
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures a default tunnel policy template for the gateway.

dhcp

Syntax 
[no] dhcp
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command enters the context of DHCPv4-based address assignment for IKEv2 remote-access tunnels.

The system will act as a DHCPv4 client on behalf of the IPSec client, and also a relay agent to relay DHCPv4 packets to the DHCPv4 server.

DHCPv4 DORA(Discovery/Offer/Request/Ack) exchange happens during IKEv2 remote-access tunnel setup. And system also supports standard renew

In order to use this feature, the relay-proxy must be enabled on the corresponding interface (either the private interface or the interface that has the gi-address as the interface address.

Default 

no dhcp

dhcp6

Syntax 
[no] dhcp6
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command enters the context of DHCPv6-based address assignment for IKEv2 remote-access tunnels.

The system will act as a DHCPv6 client on behalf of the IPSec client, and will also act as a relay agent to relay DHCPv6 packets to the DHCPv6 server.

DHCPv6 exchange happens during IKEv2 remote-access tunnel setup. The system also supports standard renew.

Default 

no dhcp6

gi-address

Syntax 
gi-address ip-address
no gi-address
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp
Description 

This command specifies the gateway IP address of the DHCPv4 packets sent by the system. IPsec DHCP Relay uses only the gi-address configuration found under the IPsec gateway and does not take into account gi-address with src-ip-addr configuration below other interfaces

Default 

no gi-address

Parameters 
ip-address—
Specifies the host IP address to be used for DHCP relay packets.

link-address

Syntax 
link-address ip-address
no link-address
Context 
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command specifies the link address of the relayed DHCPv6 packets sent by the system.

Default 

no link-address

Parameters 
ip-address—
Specifies a global unicast IPv6 address.

send-release

Syntax 
[no] send-release
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command enables the system to send a DHCPv4/v6 release message when the IPSec tunnel is removed.

Default 

no send-release

server

Syntax 
server ip-address [ip-address...(up to 8 max)] router router-instance
server ip-address [ip-address...(up to 8 max)] service-name service-name
no server
Context 
config>service>ies>if>sap>ipsec-gw>dhcp
config>service>ies>if>sap>ipsec-gw>dhcp6
config>service>vprn>if>sap>ipsec-gw>dhcp
config>service>vprn>if>sap>ipsec-gw>dhcp6
Description 

This command specifies up to eight DHCPv4/v6 server addresses for DHCPv4/v6-based address assignment. If multiple server addresses are specified, the first advertised DHCPv4/v6 address received will be chosen.

Default 

no server

Parameters 
ip-address—
Specifies a unicast IPv4 address (for DHCPv4) or global unicast IPv6 address (for DHCPv6)
router-instance—
Specifies the router instance ID used to reach the configured server address.
service-name—
Specifies the name of the IES or VPRN service used to reach the configured server address.

ike-policy

Syntax 
ike-policy ike-policy-id
no ike-policy
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures IKE policy for the gateway.

Parameters 
ike-policy-id—
Specifies the IKE policy ID.
Values—
1 — 2048

local-address-assignment

Syntax 
[no] local-address-assignment
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command enables the context to configure local address assignments for the IPSec gateway.

ipv4

Syntax 
ipv4
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description 

This command enables the context to configure IPv4 local address assignment parameters for the IPSec gateway.

address-source

Syntax 
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool secondary-pool-name]
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool
no address-source
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv6
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv6
Description 

This command specifies the IPv4 or IPv6 source of the local address assignment for the IPSec gateway, which is a pool of a local DHCPv4 or DHCPv6 server. The system will assign an internal address to an IKEv2 remote-access client from the specified pool.

Beside the IP address, netmask and DNS server can also be returned. For IPv4, the netmask and DNS server address can be returned from the specified pool, as well as the IP address. The netmask returned to the IPsec client is derived from the subnet length from the subnet x.x.x.x/m create configuration, not the subnet-mask configuration in the subnet context. For IPv6, the DNS server address can be returned from the specified pool, as well as the IP address.

For IPv4, a secondary pool can be optionally specified. The secondary pool is used if the system is unable to assign addresses from the primary pool.

Default 

no address-source

Parameters 
router-instance—
Specifies the router instance ID where the local DHCPv4 or DHCPv6 server is defined.
service-name—
Specifies the name of the service where the local DHCPv4 or DHCPv6 server is defined.
local-dhcp4-svr-name —
Specifies the name of the local DHCPv4 server.
local-dhcp6-svr-name —
Specifies the name of the local DHCv6 server.
dhcp4-server-pool—
The name of the pool defined in the specified DHCPv4 server.
dhcp6-server-pool—
The name of the pool defined in the specified DHCPv6 server.
secondary-pool-name—
The name of the secondary pool defined in the specified server

ipv6

Syntax 
ipv6
Context 
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description 

This command enables the context to configure IPv6 local address assignment parameters for the IPSec gateway.

local-gateway-address

Syntax 
local-gateway-address ip-address
no local-gateway-address
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description 

This command configures local gateway address of the IPSec gateway..

Default 

none

Parameters 
ip-address —
Specifies a unicast IPv4 address or a global unicast IPv6 address. This address must be within the subnet of the public interface.

local-gateway-address

Syntax 
local-gateway-address ip-address peer ip-address delivery-service service-id
no local-gateway-address
Context 
config>service>vprn>if>sap>ipsec-tunnel
Description 

This command specifies the local gateway address used for the tunnel and the address of the remote security gateway at the other end of the tunnelremote peer IP address to use.

Default 

The base routing context is used if the delivery-router option is not specified.

Parameters 
ip-address—
IP address of the local end of the tunnel.
delivery-service service-id
The ID of the IES or VPRN (front-door) delivery service of this tunnel. Use this service-id to find the VPRN used for delivery.
Values—
service-id: 1 — 2147483648
svc-name: Specifies an existing service name up to 64 characters in length.

local-id

Syntax 
local-id type {ipv4 | fqnd | ipv6} [value [255 chars max]]
no local-id
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
service>vprn>if>sap>ipsec-tun>dyn
Description 

This command specifies the local ID for 7750 SRs used for IDi or IDr for IKEv2 tunnels.

The no form of the command removes the parameters from the configuration.

Default 

Depends on local-auth-method like following:

  1. Psk:local tunnel ip address
  2. Cert-auth: subject of the local certificate
Parameters 
type—
Specifies the type of local ID payload, it could be IPv4 or IPv6 address/FQDN domain name, distinguish name of subject in X.509 certificate.
ipv4—
Specifies to use IPv4 as the local ID type, the default value is the local tunnel end-point address.
ipv6—
Specifies to use IPv6 as the local ID type, the default value is the local tunnel end-point address.
fqnd —
Specifies to use FQDN as the local ID type. The value must be configured.

pre-shared-key

Syntax 
pre-shared-key key [{hash | hash2}]
no pre-shared-key
Context 
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-tunnel>dynamic-keying
Description 

This command configures the pre-shared key for the IPSec gateway or IPSec tunnel.

Default 

no pre-shared-key

Parameters 
key—
An ASCII string to use as the pre-shared key for dynamic keying. When the hash or hash2 parameters are not used, the key is a clear text key; otherwise, the key text is encrypted.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

radius-accounting-policy

Syntax 
radius-accounting-policy policy-name
no radius-accounting-policy
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command specifies the radius-accounting-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-accounting-policy is defined under config>ipsec context.

Default 

none

Parameters 
policy-name—
Specifies the name of an existing radius-accounting-policy.

radius-authentication-policy

Syntax 
radius-authentication-policy policy-name
no radius-authentication-policy
Context 
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description 

This command specifies the radius-authentication-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-authentication-policy is is defined under config>ipsec context.

Default 

none

Parameters 
policy-name—
Specifies the name of an existing radius-authentication-policy.

cert

Syntax 
cert
Context 
config>service>ies>if>sap>ipsec-tunnel
Description 

This command configures cert parameters used by this SAP IPSec gateway.

cert

Syntax 
[no] cert local-file-url
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dynamic-keying>cert
config>svc>vprn>if>sap>ipsec-gw>cert>
Description 

This command specifies the certificate that 7750 SR used to identify itself in case peer need it. 7750 SR will load (reload) the certificate from the configured URL when the ipsec-tunnel/ipsec-gw is “no shutdown”.

When system is loading the certificate, it will check if it is a valid X.509v3 certificate by performing following:

  1. key file must be already configured
  2. Configured cert file must be a DER formatted X.509v3 certificate file
  3. All non-optional fields defined in section 4.1 of RFC5280 must exist in the cert-file and conform to the RFC5280 defined format.
  4. The version field to see if its value is 0x2
  5. The Validity field to see that if the certificate is still in validity period.
  6. If Key Usage extension exists, then At least digitalSignature and keyEncipherment shall be set;
  7. The public key of the certificate can match with the public key in the configured key file.

If any of above checks fails, then the “no shutdown” command will fails.

Configured certificate file url can only be changed or removed when tunnel or gw is shutdown.

Same certificate could be used for multiple ipsec-tunnels or ipsec-gws, however for each certificate file, there is only one memory instance, if a certificate file has been updated, “no shutdown” in any of tunnel that use the certificate file will cause the memory instance updated, which will not impact the current up and running tunnels that use the certificate file, but the new authentication afterwards will use the updated memory instance. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.

Default 

None

Parameters 
local-file-url—
URL for input file, this url is local CF card URL.

key

Syntax 
[no] key local-file-url
Context 
config>service>vprn>if>sap>ipsec-tun>dynamic-keying>cert
config>svc>vprn>if>sap>ipsec-gw>cert
config>service>ies>if>sap>ipsec-gateway>cert
Description 

This command specifies the key pair file 7750 SR will use for X.509 certificate authentication. System will load the key file when the ipsec-tunnel/gw is “no shutdown”

When system is loading the key file, it will check if it is a valid 7750 SR formatted key file.

Key file url can only be changed or removed when tunnel or gw is shutdown.

Same key could be used for multiple ipsec-tunnels or ipsec-gws, however for each key file, there is only one memory instance, if a key file has been updated, “no shutdown” in any of tunnel that use the key file will cause the memory instance updated, which will not impact the current up and running tunnels that use the key file, but the new authentication afterwards will use the updated memory instance. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.

Default 

None

Parameters 
local-file-url —
URL for input file, this url is local CF card URL.

status-verify

Syntax 
status-verify
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command enables the context to configure certificate recovation status verification parameters.

Default 

none

default-result

Syntax 
default-result {revoked | good}
no default-result
Context 
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>>cert-status-verify
Description 

This command specifies the default result when both the primary and secondary method failed to provide an answer.

Default 

default-result revoked

Parameters 
good—
Specifies that the certificate is considered as acceptable.
revoked—
Specifies that the certificate is considered as revoked.

primary

Syntax 
primary {ocsp | crl}
no primary
Context 
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>cert-status-verify
Description 

This command specifies the primary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP

OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.

Default 

primary crl

Parameters 
ocsp—
Specifies to use the OCSP protocol. The OCSP server is configured in the corresponding ca-profile.
crl—
Specifies to use the local CRL file The CRL file is configured in the corresponding ca-profile

secondary

Syntax 
secondary {ocsp | crl}
no secondary
Context 
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>cert-status-verify
Description 

This command specifies the secondary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP.

OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.

secondary method will only be used when the primary method failed to provide an answer:

  1. OCSP — unreachable / any answer other than “good” or “revoked” / ocsp is NOT configured in ca-profile/ OCSP response is not signed/Invalid nextUpdate
  2. CRL: CRL expired
Default 

no secondary

Parameters 
ocsp—
Specifies to use the OCSP protocol, the OCSP server is configured in the corresponding ca-profile.
crl—
Specifies to use the local CRL file, the CRL file is configured in the corresponding ca-profile

auto-establish

Syntax 
[no] auto-establish
Context 
config>service>vprn>if>sap>ipsec-tun>dynamic-keyig
Description 

The system will automatically establish phase 1 SA as soon as the tunnel is provisioned and enabled (no shutdown). This option should only be configured on one side of the tunnel.

Any associated static routes will remain up as long as the tunnel could be up, even though it may actually be Oper down according to the CLI.

Default 

None

trust-anchor-profile

Syntax 
trust-anchor-profile name
no trust-anchor-profile
Context 
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command specifies the trust-anchor-profile for the ipsec-tunnel or ipsec-gw. This command will override “trust-anchor” configuration under the ipsec-tunnel or ipsec-gw.

Default 

No

Parameters 
profile-name—
Specifies the name of trust-anchor-profile.

trust-anchor

Syntax 
trust-anchor ca-profile-name
no trust-anchor
Context 
config>service>ies>if>sap>ipsec-gateway>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description 

This command configures trust anchor with a CA profile used by this SAP IPSec gateway. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.

Parameters 
name—
Specifies the CA profile to use in the trust anchor. Specify a file name, 95 characters maximum.

ts-list

Syntax 
ts-list list-name [create]
no ts-list list-name
Context 
config>ipsec
Description 

This command creates a new TS-list.

The no form of the command removes the list name from the configuration.

Parameters 
list-name—
Specifies the name of the TS-list.

local

Syntax 
local
Context 
config>ipsec>ts-list
Description 

This command enables the context to configure local TS-list parameters. The TS-list is the traffic selector of the local system, such as TSr when the system acts as an IKEv2 responder.

remote

Syntax 
remote
Context 
config>ipsec>ts-list
Description 

This command enables the context to configure remote TS-list parameters. The TS-list is the traffic selector of the local system, such as TSi when the system acts as an IKEv2 responder.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>ipsec>ts-list>local
config>ipsec>ts-list>remote
Description 

This command creates a new TS-list entry or enables the context to configure an existing TS-list entry.

The no form of the command removes the entry from the local or remote configuration.

Default 

n/a

Parameters 
entry-id—
Specifies the entry ID
Values—
1 to 32

address

Syntax 
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
no address
Context 
config>ipsec>ts-list>local>entry
config>ipsec>ts-list>remote>entry
Description 

This command specifies the address range in the IKEv2 traffic selector.

Default 

n/a

Parameters 
ip-prefix/ip-prefix-len—
Specifies the IP prefix and subnet mask
begin-ip-address—
Specifies the beginning address of the range for this entry
end-ip-address—
Specifies the ending address of the range for this entry

protocol

Syntax 
protocol any
protocol protocol-id port opaque
protocol protocol-id port any
protocol protocol-id port from begin-port-id to end-port-id
no protocol
Context 
config>ipsec>ts-list>local>entry
config>ipsec>ts-list>remote>entry
Description 

This command specifies the protocol and port range in the IKEv2 traffic selector.

The SR OS supports OPAQUE ports and port ranges for the following protocols:

  1. TCP
  2. UDP
  3. SCTP
  4. ICMP
  5. ICMPv6
  6. MIPv6

For ICMP and ICMPv6, the port value takes the form icmp-type/icmp-code. For MIPv6, the port value is the mobility header type. For other protocols, only the port any configuration can be used.

Default 

n/a

Parameters 
protocol-id—
Specifies the protocol ID. The value can be a number, a protocol name, or any.
begin-port-id—
Specifies the beginning of the port range
Values—
For TCP, UDP, and SCTP, the value is the port number.
For ICMP and ICMPv6, the value takes the form icmp-type/icmp-code; for example, 0/0.
For MIPv6, the value is the mobility header type.
end-port-id—
Specifies the end of the port range
Values—
For TCP, UDP, and SCTP, the value is the port number.
For ICMP and ICMPv6, the value takes the form icmp-type/icmp-code; for example, 0/0.
For MIPv6, the value is the mobility header type.
opaque—
Specifies OPAQUE ports
any—
Specifies any port

ts-negotiation

Syntax 
ts-negotiation ts-list list-name
no ts-negotiation
Context 
config>service>ies>if>sap>ipsec-gw
Description 

This command enables the IKEv2 traffic selector negotiation with the specified ts-list.

Parameters 
ts-list list-name—
Specifies the ts-list name

IPSec Mastership Election Commands

The commands described in this section are applicable only to the 7750 SR.

multi-chassis

Syntax 
multi-chassis
Context 
config>redundancy
Description 

Thiis command enables the context to configure multi-chassis parameters.

peer

Syntax 
peer ip-address [create]
no peer ip-address
Context 
config>redundancy
Description 

This command configures a multi-chassis redundancy peer.

Parameters 
ip-address—
Specifies the peer address.
create—
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled/disabled in the environment>create context.

mc-ipsec

Syntax 
[no] mc-ipsec
Context 
config>redundancy>multi-chassis>peer
Description 

This command enables the context to configure multi-chassis peer parameters.

bfd-enable

Syntax 
[no] bfd-enable
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command enables tracking a central BFD session, if the BFD session goes down, then system consider the peer is down and change the mc-ipsec status of configured tunnel-group accordingly.

The BFD session uses specified the loopback interface (in the specified service) address as the source address and uses specified dst-ip as the destination address. Other BFD parameters are configured with the bfd command on the specified interface.

Default 

300

discovery-interval

Syntax 
discovery-interval interval-secs [boot interval-secs]
no discovery-interval
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the time interval of tunnel-group stays in “Discovery” state. Interval-1 is used as discovery-interval when a new tunnel-group is added to multi-chassis redundancy (mp-ipsec); interval-2 is used as discovery-interval when system boot-up, it is optional, when it is not specified, the interval-1 will be used.

Default 

300

Parameters 
interval-secs—
Specifies the maximum duration, in seconds, of the discovery interval during which a newly activated multi- chassis IPsec tunnel-group will remain dormant while trying to contact its redundant peer. Groups held dormant in this manner will neither pass traffic nor negotiate security keys. This interval ends when either the redundant peer is contacted and a master election occurs, or when the maximum duration expires.
Values—
1 — 1800
boot interval-secs
Specifies the maximum duration of an interval immediately following system boot up. When the normal discovery interval for a group would expire while the post-boot discovery interval is still active, then the group's discovery interval is extended until the post-boot discovery interval expires. This allows an extension to the normal discovery stage of groups following a chassis reboot, to account for the larger variance in routing

hold-on-neighbor-failure

Syntax 
hold-on-neighbor-failure multiplier
no hold-on-neighbor-failure
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the number of keep-alive failure before consider the peer is down.

The no form of the command reverts to the default.

Default 

3

Parameters 
multiplier—
Specifies the hold time applied on neighbor failure
Values—
2 — 25

keep-alive-interval

Syntax 
keep-alive-interval interval
no keep-alive-interval
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the time interval of mastership election protocol sending keep-alive packet.

The no form of the command reverts to the default.

Default 

10

Parameters 
interval—
Specifies the keep alive interval in tenths of seconds.
Values—
5 — 500

tunnel-group

Syntax 
tunnel-group tunnel-group-id [create]
no tunnel-group tunnel-group-id
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command enables multi-chassis redundancy for specified tunnel-group; or enters an already configured tunnel-group context. The configured tunnel-group could failover independently.

The no form of the command removes the tunnel group ID from the configuration.

Default 

none

Parameters 
tunnel-group-id—
Specifies the tunnel-group identifier.
Values—
1 — 16

peer-group

Syntax 
peer-group tunnel-group-id
no peer-group
Context 
config>redundancy>multi-chassis>peer>mc-ipsec
Description 

This command specifies the corresponding tunnel-group id on peer node. The peer tunnel-group id does not necessary equals to local tunnel-group id.

The no form of the command removes the tunnel group ID from the configuration.

Default 

none

Parameters 
tunnel-group-id—
Specifies the tunnel-group identifier.
Values—
1 — 16

priority

Syntax 
priority priority
no priority
Context 
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description 

This command specifies the local priority of the tunnel-group, this is used to elect master, higher number win. If priority are same, then the peer has more active ISA win; and priority and the number of active ISA are same, then the peer with higher IP address win.

The no form of the command removes the priority value from the configuration.

Default 

100

Parameters 
priority—
Specifies the priority of this tunnel-group.
Values—
0 — 255

protocol

Syntax 
protocol {protocol} [all | instance instance]
no protocol
Context 
config>router>policy-options>policy-statement>entry>to
config>router>policy-options>policy-statement>entry>from
Description 

This command configures a routing protocol as a match criterion for a route policy statement entry. This command is used for both import and export policies depending how it is used.

When the ipsec is specified this means IPSecroutes.

If no protocol criterion is specified, any protocol is considered a match.

The no form of the command removes the protocol match criterion.

Default 

no protocol — Matches any protocol.

Parameters 
protocol—
The protocol name to match on.
Values—
direct, static, bgp, isis, ospf, rip, aggregate, bgp-vpn, igmp, pim, ospf3, ldp, sub-mgmt, mld, managed, vpn-leak, tms, nat, periodic, ipsec, mpls
instance—
The OSPF or IS-IS instance.
Values—
1 — 31
all—
OSPF- or ISIS-only keyword.

state

Syntax 
state state
no state
Context 
config>router>policy-options>policy-statement>entry>from
Description 

This command will configure a match criteria on the state attribute. The state attribute carries the state of an SRRP instance and it can be applied to:

  1. subscriber-interface routes
  2. subscriber-management routes (/32 IPv4 and IPv6 PD wan-host)
  3. managed-routes (applicable only to IPv4).

Based on the state attribute of the route we can manipulate the route advertisement into the network.

We can enable or disable (in case there is no SRRP running) tracking of SRRP state by routes.

This is done on a per subscriber-interface route basis, where a subscriber-interface route is tracking a single SRRP instance state (SRRP instance might be in a Fate Sharing Group).

For subscriber-management and managed-routes, tracking is enabled per group interface under which SRRP is enabled.

Default 

none

Parameters 
state—
The state attribute.
Values—
srrp-master | srrp-non-master | ipsec-master-with-peer | ipsec-non-master | ipsec-master-without-peer

srrp-master

Track routes with the state attribute carrying srrp-master state

srrp-non-master

Track routes with the state attribute carrying srrp-non-master state.

psec-master-with-peer

Track routes with the state attribute carrying ipsec-master-with-peer state.

ipsec-non-master

Track routes with the state attribute carrying ipsec-non-master state.

ipsec-master-without-peer

Track routes with the state attribute carrying ipsec-master-without-peer state.

tunnel-group

Syntax 
tunnel-group tunnel-group-id sync-tag tag-name [create]
no tunnel-group
Context 
config>redundancy>multi-chassis>peer>sync
Description 

This command enables multi-chassis synchronization of IPsec states of specified tunnel-group with peer. sync-tag is used to match corresponding tunnel-group on both peers. IPsec states will be synchronized between tunnel-group with same sync-tag.

Default 

no

Parameters 
tunnel-group-id—
Specifies the id of the tunnel-group
tag-name—
Specifies the name of the sync-tag.

ipsec

Syntax 
[no] ipsec
Context 
config>redundancy>multi-chassis>peer>sync
Description 

This command enables multi-chassis synchronization of IPsec states on system level.

Default 

no

ipsec-responder-only

Syntax 
[no] ipsec-responder-only
Context 
config>isa>tunnel-group
Description 

With this command configured, system will only act as IKE responder except for the automatic CHILD_SA rekey upon MC-IPsec switchover.

Default 

no

IPSec RADIUS Commands

radius-accounting-policy

Syntax 
radius-accounting-policy name [create]
no radius-accounting-policy name
Context 
config>ipsec
Description 

This command specifies an existing RADIUS accounting policy to use to collect accounting statistics on this subscriber profile by RADIUS. This command is used independently of the collect-stats command.

Parameters 
name—
Specifies an existing RADIUS based accounting policy.

radius-authentication-policy

Syntax 
radius-authentication-policy name [create]
no radius-authentication-policy name
Context 
config>ipsec
Description 

This command specifies the radius authentication policy associated with this IPsec gateway.

include-radius-attribute

Syntax 
[no] include-radius-attribute
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.

called-station-id

Syntax 
[no] called-station-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command includes called station id attributes.

The no form of the command excludes called station id attributes.

calling-station-id

Syntax 
[no] calling-station-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages.

Default 

no calling-station-id

client-cert-subject-key-id

Syntax 
[no] client-cert-subject-key-id
Context 
config>ipsec>rad-auth-plcy>include
Description 

This command enables the inclusion of the Subject Key Identifier of the peer's certificate in the RADIUS Access-Request packet as VSA: Alc-Subject-Key-Identifier. Refer to the SROS RADIUS Attributes Reference Guide for more information.

Default 

no client-cert-subject-key-id

framed-ip-addr

Syntax 
[no] framed-ip-addr
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the inclusion of the framed-ip-addr attribute.

nas-identifier

Syntax 
[no] nas-identifier
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the nas-identifier RADIUS attribute.

nas-ip-addr

Syntax 
[no] nas-ip-addr
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the NAS ip-address attribute.

nas-port-id

Syntax 
[no] nas-port-id
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command enables the generation of the nas-port-id RADIUS attribute. Optionally, the value of this attribute (the SAP-id) can be prefixed by a fixed string and suffixed by the circuit-id or the remote-id of the client connection. If a suffix is configured, but no corresponding data is available, the suffix used will be 0/0/0/0/0/0.

radius-server-policy

Syntax 
radius-server-policy radius-server-policy-name
no radius-server-policy
Context 
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description 

This command references an existing radius-server-policy (available under the config>aaa context) for use in subscriber management authentication and accounting.

When configured in an authentication-policy, following CLI commands are ignored in the policy to avoid conflicts:

  1. all commands in the radius-authentication-server context
  2. accept-authorization-change
  3. coa-script-policy
  4. accept-script-policy
  5. request-script-policy

When configured in a radius-accounting-policy, following CLI commands are ignored in the policy to avoid conflicts:

  1. all commands in the radius-accounting-server context
  2. acct-request-script-policy

The no form of the command removes the radius-server-policy reference from the configuration

Default 

no radius-server-policy

Parameters 
radius-server-policy-name—
Specifies the RADIUS server policy.

update-interval

Syntax 
update-interval minutes [jitter seconds]
no update-interval
Context 
config>ipsec>rad-acct-plcy
Description 

This command enables the system to send RADIUS interim-update packets for IKEv2 remote-access tunnels. The RADIUS attributes in the interim-update packet are the as same as acct-start. The value of the Acct-status-type in the interim-update message is 3.

Default 

none

Parameters 
minutes—
Specifies the interval in minutes.
Values—
5— 259200
seconds—
Specifies the jitter as the number of seconds when thesystem sends each interim-update packet.
Values—
0 — 3600

password

Syntax 
password password [hash | hash2]
no password
Context 
config>ipsec>rad-auth-plcy>include
Description 

This command specifies the password that is used in the RADIUS access requests.It shall be specified as a string of up to 32 characters in length.

The no form of the command resets the password to its default of ALU and will be stored using hash/hash2 encryption.

Default 

ALU

Parameters 
password—
Specifies a password string up to 32 characters in length.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.

CMPv2 Commands

pki

Syntax 
pki
Context 
config>system>security
Description 

This command enables the context to configure PKI related parameters.

Default 

none

ca-profile

Syntax 
ca-profile name [create]
no ca-profile name
Context 
config>system>security>pki
Description 

This command creates a new ca-profile or enter the configuration context of an existing ca-profile. Up to 128 ca-profiles could be created in the system. A shutdown the ca-profile will not affect the current up and running ipsec-tunnel or ipsec-gw that associated with the ca-profile. But authentication afterwards will fail with a shutdown ca-profile.

Executing a no shutdown command in this context will cause system to reload the configured cert-file and crl-file.

A ca-profile can be applied under the ipsec-tunnel or ipsec-gw configuration.

The no form of the command removes the name parameter from the configuration. A ca-profile can not be removed until all the association(ipsec-tunnel/gw) have been removed.

Parameters 
name—
Specifies the name of the ca-profile, a string up to 32 characters.
create—
Keyword used to create a new ca-profile. The create keyword requirement can be enabled/disabled in the environment>create context.

certificate

Syntax 
certificate
Context 
admin
Description 

This command enables the context to configure X.509 certificate related operational parameters.

certificate-display-format

Syntax 
certificate-display-format {ascii | utf8}
Context 
config>system>security>pki
Description 

This command specifies the certificate subject display format.

Default 

ascii

Parameters 
ascii—
Use ascii encoding.
utf8—
Use utf8 encoding.

cmpv2

Syntax 
cmpv2
Context 
admin>certificate
config>system>security>pki>ca-profile
Description 

This command enables the context to configure CMPv2 parameters. Changes are not allowed when the CA profile is enabled (no shutdown).

accept-unprotected-errormsg

Syntax 
[no] accept-unprotected-errormsg
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 error message. Without this command, system will only accept protected error messages.

The no form of the command causes the system to only accept protected PKI confirmation message.

Default 

no

accept-unprotected-pkiconf

Syntax 
[no] accept-unprotected-pkiconf
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command enables the system to accept both protected and unprotected CMPv2 PKI confirmation messages. Without this command, system will only accept protected PKI confirmation message.

The no form of the command causes the system to only accept protected PKI confirmation message.

Default 

none

always-set-sender-for-ir

Syntax 
[no] always-set-sender-for-ir
Context 
config>system>security>pki>ca-profile>cmpv2
Description 

This command specifies to always set the sender field in CMPv2 header of all Initial Registration (IR) messages with the subject name. By default, the sender field is only set if an optional certificate is specified in the CMPv2 request.

Default 

no always-set-sender-for-ir

key-list

Syntax 
cmp-key-list
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command enables the context to configure pre-shared key list parameters.

key

Syntax 
key password [hash | hash2] reference reference-number
no key reference reference-number
Context 
config>system>security>pki>ca-profile>cmp2>key-list
Description 

This command specifies a pre-shared key used for CMPv2 initial registration. Multiples of key commands are allowed to be configured under this context.

The password and reference-number is distributed by the CA via out-of-band means.

The configured password is stored in configuration file in an encrypted form by using SR OS hash2 algorithm.

The no form of the command removes the parameters from the configuration.

Default 

none

Parameters 
password—
Specifies a printable ASCII string, up to 64 characters in length.
hash—
Specifies the key is entered in an encrypted form. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified
hash2—
Specifies the key is entered in a more complex encrypted form that involves more variables than the key value alone, meaning that the hash2 encrypted variable cannot be copied and pasted. If the hash or hash2 parameter is not used, the key is assumed to be in an unencrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash or hash2 parameter specified.
reference reference-number
Specifies a printable ASCII string, up to 64 characters in length.

url

Syntax 
cmp-url url-string [service-id service-id]
no cmp-url
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies HTTP URL of the CMPv2 server. The URL must be unique across all configured ca-profiles.

The URL will be resolved by the DNS server configured (if configured) in the corresponding router context.

If the service-id is 0 or omitted, then system will try to resolve the FQDN via DNS server configured in bof.cfg. After resolution, the system will connect to the address in management routing instance first, then base routing instance.

If the service is VPRN, then the system only allows HTTP ports 80 and 8080.

Default 

none

Parameters 
url-string—
Specifies the HTTP URL of the CMPv2 server up to 180 characters in length.
service-id service-id
Specifies the service instance that used to reach CMPv2 server.
Values—
service-id: 1..2147483647
base-router: 0

revocation-check

Syntax 
revocation-check {crl | crl-optional}
Context 
config>system>security>pki>ca-profile
Description 

This command specifies the revocation method system used to check the revocation status of certificate issued by the CA, the default value is crl, which will use CRL. But if it is crl-optional, then it means when the user disables the ca-profile, then the system will try to load the configured CRL (specified by the crl-file command). But if the system fails to load it for following reasons, then the system will still bring ca-profile oper-up, but leave the CRL as non-exist.

  1. CRL file does not exist
  2. CRL is not properly encoded - maybe due to interrupted file transfer
  3. CRL does not match cert
  4. Wrong CRL version
  5. CRL expired

If the system needs to use the CRL of a specific ca-profile to check the revocation status of an end-entity cert, and the CRL is non-existent due to the above reasons, then the system will treat it as being unable to get an answer from CRL and fall back to the next status-verify method or default-result.

If the system needs to check the revocation of a CA cert in cert chain, and if the CRL is non-existent due to the above reasons, then the system will skip checking the revocation status of the CA cert. For example, if CA1 is issued by CA2, if CA2’s revocation-check is crl-optional and the CA2’s CRL is non-existent, then the system will not check CA1 cert’s revocation status and consider it as “good”.

Note:

Users must shutdown the ca-profile to change the revocation-check configuration.

Default 

revocation-check crl

Parameters 
crl—
Specifies to use the configured CRL.
crl-optional—
Specifies that the CRL is optional.

http-response-timeout

Syntax 
http-response-timeout timeout
no http-response-timeout
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies the timeout value for HTTP response that is used by CMPv2.

The no form of the command reverts to the default.

Default 

30 seconds

Parameters 
timeout—
Specifies the HTTP response timeout in seconds.
Values—
1 — 3600

http-version

Syntax 
http-version [1.0 | 1.1]
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command configures the the HTTP version for CMPv2 messages.

Default 

1.1

response-signing-cert

Syntax 
response-signing-cert filename
no response-signing-cert
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command specifies a imported certificate that is used to verify the CMP response message if they are protected by signature. If this command is not configured, then CA’s certificate will be used.

Default 

none

Parameters 
filename—
Specifies the filename of the imported certificate.

same-recipnonce-for-pollreq

Syntax 
[no] same-recipnonce-for-pollreq
Context 
config>system>security>pki>ca-profile>cmp2
Description 

This command enables the system to use same recipNonce as the last CMPv2 response for poll request.

Default 

none

cert-request

Syntax 
cert-request ca ca-profile-name current-key key-filename current-cert cert-filename [hash-alg hash-algorithm] newkey key-filename subject-dn subject-dn [domain-name <[255 chars max]> [ip-addr <ip-address | ipv6-address>] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command requests an additional certificate after the system has obtained the initial certificate from the CA.

The request is authenticated by a signature signed by the current-key, along with the current-cert. The hash algorithm used for signature is depends on the key type:

  1. DSA key: SHA1
  2. RSA key: MD5/SHA1/SHA224 | SHA256 | SHA384 | SHA512, by default is SHA1

In some cases, the CA may not return a certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.

Default 

none

Parameters 
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
current-key key-filename
Specifies corresponding certificate issued by the CA up to 95 characters in max.
current-cert cert-filename
Specifies the file name of an imported certificate that is attached to the certificate request up to 95 characters in max.
newkey key-filename
Specifies the file name of the imported key up to 95 characters in max..
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512
subject-dn dn
Specifies the subject of the requesting certificate up to 256 chars max.
Values—
attr1=val1,attr2=val2 where: attrN={C | ST | O | OU | CN}
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.
domain-name —
Specifies a FQDN for SubjectAltName of the requesting certificate up to 255 characters in length.
ip-addr <ip-address | ipv6-address>—
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.

clear-request

Syntax 
clear-request ca ca-profile-name
Context 
admin>certificate>cmpv2
Description 

This command clears current pending CMPv2 requests toward the specified CA. If there are no pending requests, it will clear the saved result of prior request.

Default 

none

Parameters 
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max.

initial-registration

Syntax 
initial-registration ca ca-profile-name key-to-certify key-filename protection-alg {password password reference ref-number | signature [cert cert-file-name [send-chain [with-ca ca-profile-name]]] [protection-key key-file-name] [hash-alg {md5 | sha1 | sha224 | sha256 | sha384 | sha512}]} subject-dn dn [domain-name <[255 chars max]> [ip-addr <ip-address|ipv6-address>] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command request initial certificate from CA by using CMPv2 initial registration procedure.

The ca parameter specifies a CA-profile which includes CMP server information.

The key-to-certify is an imported key file to be certified by the CA.

The protection-key is an imported key file used to for message protection if protection-alg is signature.

The request is authenticated either of following methods:

  1. A password and a reference number that pre-distributed by CA via out-of-band means.
  2. The specified password and reference number are not necessarily in the cmp-keylist configured in the corresponding CA-Profile
  3. A signature signed by the protection-key or key-to-certify, optionally along with the corresponding certificate. If the protection-key is not specified, system will use the key-to-certify for message protection. The hash algorithm used for signature is depends on key type:
  4. DSA key: SHA1
  5. RSA key: MD5/SHA1/SHA224 | SHA256 | SHA384 | SHA512, by default is SHA1

Optionally, the system could also send a certificate or a chain of certificates in extraCerts field. Certificate is specified by the “cert” parameter, it must include the public key of the key used for message protection.

Sending a chain is enabled by specify the send-chain parameter.

subject-dn specifies the subject of the requesting certificate.

save-as specifies full path name of saving the result certificate.

In some cases, CA may not return certificate immediately, due to reason like request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command could be used to poll the status of the request. If key-list is not configured in the corresponding ca-profile, then the system will use the existing password to authenticate the CMPv2 packets from server if it is in password protection.

If key-list is configured in the corresponding ca-profile and server doesn't send SenderKID, then the system will use lexicographical first key in the key-list to authenticate the CMPv2 packets from server in case it is in password protection.

Default 

none

Parameters 
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
key-to-certify key-filename
Specifies the file name of the key to certify up to 95 characters max.
password password
Specifies an ASCII string up to 64 characters in length.
reference ref-number
Specifies the reference number for this CA initial authentication key up to 64 characters max.
cert cert-file-name
specifies the certificate file up to 95 characters max.
send-chain with-ca ca-profile-name
Specifies to send the chain.
protection-key key-file-name
Specifies the protection key associated with the action on the CA profile.
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512
subject-dn dn
Specifies the subject of the requesting certificate up to 256 chars max.
Values—
attr1=val1,attr2=val2 where: attrN={C | ST | O | OU | CN}
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.
domain-name —
Specifies a FQDN for SubjectAltName of the requesting certificate up to 255 characters in length.
ip-addr <ip-address | ipv6-address>—
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.

key-update

Syntax 
key-update ca ca-profile-name newkey key-filename oldkey key-filename oldcert cert-filename [hash-alg hash-algorithm] save-as save-path-of-result-cert
Context 
admin>certificate>cmpv2
Description 

This command requests a new certificate from the CA to update an existing certificate due to reasons such as key refresh or replacing compromised key.

In some cases, the CA may not return certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.

Parameters 
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
newkey key-filename
Specifies the key file of the requesting certificate up to 95 characters max.
oldkey key-filename
Specifies the key to be replaced up to 95 characters max.
oldcert cert-filename
Specifies the file name of an imported certificate to be replaced up to 95 characters max
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values—
md5,sha1,sha224,sha256,sha384,sha512
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.

poll

Syntax 
poll ca ca-profile-name
Context 
admin>certificate>cmpv2
Description 

This command polls the status of the pending CMPv2 request toward the specified CA.

If the response is ready, this command will resume the CMPv2 protocol exchange with server as the original command would do. The requests could be also still be pending as a result, then this command could be used again to poll the status.

SR OS allows only one pending CMP request per CA, which means no new request is allowed when a pending request is present.

Default 

none

Parameters 
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max.

show-request

Syntax 
show-request [ca ca-profile-name]
Context 
admin>certificate>cmpv2
Description 

This command displays current the CMPv2 pending request toward the specified CA. If there is no pending request, the last pending request is displayed including the status (success/fail/rejected) and the receive time of last CMPv2 message from server.

The following information is included in the output:

  1. Request type, original input parameter(password is not displayed), checkAfter and reason in of last PollRepContent, time of original command input.
Default 

none

Parameters 
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max. If not specified, the system will display pending requests of all ca-profiles.

Auto-Update Command Descriptions

file-transmission-profile

Syntax 
file-transmission-profile name [create]
no file-transmission-profile name
Context 
config>system
Description 

This command creates a new file transmission profile or enters the configuration context of an existing file-transmission-profile.

The file-transmission-profile context defines transport parameters for protocol such as HTTP, include routing instance, source address, timeout value, etc.

Default 

n/a

Parameters 
name—
Specifies the file-transmission-profile name, up to 32 characters. in length.

ipv4-source-address

Syntax 
ipv4-source-address ip-address
no ipv4-source-address
Context 
config>system>file-trans-prof
Description 

This command specifies the IPv4 source address used for transport protocol.

The no form of this command uses the default source address which typically is the address of the egress interface.

Default 

no ipv4-source-address

Parameters 
ip-address —
Specifies a unicast v4 address. This should be a local interface address.

ipv6-source-address

Syntax 
ipv6-source-address ipv6-address
no ipv6-source-address
Context 
config>system>file-trans-prof
Description 

This command specifies the IPv6 source address used for transport protocol.

The no form of this command uses the default source address which typically is the address of egress interface.

Default 

no ipv6-source-address

Parameters 
Ipv6-address—
Specifies a unicast v6 address. This should be a local interface address.

redirection

Syntax 
redirection level
no redirection
Context 
config>system>file-trans-prof
Description 

This command enables system to accept HTTP redirection response, along with the max level of redirection. The virtual router may send a new request to another server if the requested resources are not available (e.g., temporarily available to another server).

Default 

no redirection

Parameters 
level—
Specifies the maximum level of redirection of the file transmission profile. max level of HTTP redirection.
Values—
1 — 8

retry

Syntax 
retry count
no retry
Context 
config>system>file-trans-prof
Description 

This command specifies the number of retries on transport protocol level.

When the virtual router does not receive any data from a server (e.g., FTP or HTTP server) after the configured timeout seconds, the router may repeat the request to the server. The number of retries specifies the maximum number of repeated requests.

The no form of this command disables the retry.

Default 

no retry

Parameters 
count—
Specifies the number of retries.
Values—
1 — 256

router

Syntax 
router router-instance
Context 
config>system>file-trans-prof
Description 

This command specifies the routing instance that the transport protocol uses.

Default 

router "Base"

Parameters 
router-instance—
Specifies the router instance on which the file transmission connection will be established.
Values—

<router-instance> :

<router-name> | <service-id>

router-name

"Base" | "management" | "vpls-management"

service-id

[1..2147483647]

timeout

Syntax 
timeout seconds
Context 
config>system>file-trans-prof
Description 

This command specifies timeout value in seconds for transport protocol. The timeout is the maximum waiting time to receive any data from the server (e.g., FTP or HTTP server).

Default 

60

Parameters 
seconds—
Specifies the connection timeout (in seconds) for the file transmission.
Values—
1 — 3600

auto-crl-update

Syntax 
auto-crl-update [create]
no auto-crl-update
Context 
config>system>security>pki>ca-prof
Description 

This command creates an auto CRL update configuration context with the create parameter, or enters the auto-crl-update configuration context without the create parameter.

This mechanism auto downloads a CRL file from a list of configured HTTP URLs either periodically or before existing CRL expires. If the downloaded CRL is more recent than the existing one, then the existing one will be replaced.

Note:

The configured URL must point to a DER encoded CRL file.

Default 

no auto-crl-update

Parameters 
create—
Creates an auto CRL update for the ca-profile.

crl-urls

Syntax 
crl-urls
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command enables the context to configure crl-urls parameters. The system allows up to eight URL entries to be configured and will try each URL in order and stop when a qualified CRL is successfully downloaded. A qualified CRL is a valid CRL signed by the CA and is more recent than the existing CRL.

If none of the configured URLs returns a qualified CRL, then:

  1. If the schedule-type is next-update-based, system will wait for configure retry-interval before it start from beginning of the list again.
  2. If the schedule-type is periodic, then system will wait till next periodic update time.

If the user wants to manually stop the download, shutting down of auto-crl-retrieval could be used to achieve this.

Default 

n/a

url-entry

Syntax 
url-entry entry-id [create]
no url-entry entry-id
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls
Description 

This command creates a new crl-url entry with the create parameter, or enters an existing url-entry configuration context without create parameter.

The no form of this command removes the specified entry.

Default 

n/a

Parameters 
entry-id—
Specifies a URL configured on this system.
Values—
1 — 8
create—
Creates an auto URL entry.

file-transmission-profile

Syntax 
file-transmission-profile profile-name
no file-transmission-profile
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls> url-entry
Description 

This command specifies the file-transmission-profile for the url-entry. When the system downloads a CRL from the configured URL in the url-entry it will use the transportation parameter configured in the file-transmission-profile. auto-crl-update supports Base/Management/VPRN routing instance. vpls-management is not supported. In case of VPRN, the HTTP server port can only be 80 or 8080.

The no form of the command removes the specified profile name.

Default 

n/a

Parameters 
profile-name—
Specifies the name of the file transmission profile to be matched up to 32 characters in length. The file-transmission-profile name is configured under config>system>file-transmission-profile.

url

Syntax 
url url
no url
Context 
config>system>security>pki>ca-prof>auto-crl-update>crl-urls> url-entry
Description 

This command specifies the HTTP URL of the CRL file for the url-entry. The system supports both IPv4 and IPv6 HTTP connections.

Note:

The URL must point to a DER encoded CRL.

Default 

n/a

Parameters 
url—
Specifies the URL, which specifies the location, where an updated CRL can be downloaded from.

periodic-update-interval

Syntax 
periodic-update-interval [days days] [hrs hours] [min minutes] [sec seconds]
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the interval for periodic updates. The minimal interval is 1 hour. The maximum interval is 366 days.

Default 

days 1

Parameters 
days days
Specifies the number of days for periodic updates.
Values—
0 — 366
hrs hours
Specifies the number of hours for periodic updates.
Values—
0 — 23
min minutes
Specifies the number of minutes for periodic updates.
Values—
0 — 59
sec seconds
Specifies the number of seconds for periodic updates.
Values—
0 — 59

retry-interval

Syntax 
retry-interval seconds
no retry-interval
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the interval, in seconds, that the system waits before retrying the configured url-entry list when schedule-type is next-update-based and none of the URLs return a qualified CRL.

The no form of the command causes the system to retry immediately without waiting.

Default 

3600

Parameters 
seconds—
Specifies an interval, in seconds, before retrying to update the CRL.
Values—
1 — 31622400

pre-update-time

Syntax 
pre-update-time [days days] [hrs hours] [min minutes] [sec seconds]
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the pre-download time for next-update-based update.

Default 

hrs 1

Parameters 
days days
Specifies the time period, in days, prior to the next update time of the current CRL.
Values—
0 — 366
hrs hours
Specifies the time period, in hours, prior to the next update time of the current CRL.
Values—
0 — 23
min minutes
Specifies the time period, in minutes, prior to the next update time of the current CRL.
Values—
0 — 59
sec seconds
Specifies the time period, in seconds, prior to the next update time of the current CRL.
Values—
0 — 59

schedule-type

Syntax 
schedule-type schedule-type
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command specifies the schedule type for auto CRL update. The system supports two types:

  1. periodic: — The system will download a CRL periodically at the interval configured via the periodic-update-interval command. For example, if the periodic-update-interval is 1 day, then the system will download a CRL every 1 day. The minimal periodic-update-interval is 1 hour.
  2. ext-update-based — The system will download a CRL at the time = Next_Update_of_existing_CRL minus pre-update-time. For example, if the Nex-Update of the existing CRL is 2015-06-30 06:00 and pre-update-time is 1 hour, then the system will start downloading at 2015-06-30, 05:00.
Default 

next-update-based

Parameters 
schedule-type—
Specifies the type of time scheduler to update the CRL.
Values—
periodic, next-update-based

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>pki>ca-prof>auto-crl-update
Description 

This command disables the auto CRL update.

The no form of this command enables an auto CRL update. Upon no shutdown, if the configured CRL file does not exist, is invalid or is expired or if the schedule-type is next-update-based and current time passed (Next-Update_of_existing_CRL - pre-update-time), then system will start downloading CRL right away.

Default 

shutdown

crl-update

Syntax 
crl-update ca ca-profile-name
Context 
admin>certificate
Description 

This command manually triggers the CRL update for the specified ca-profile.

Using this command requires shutting down the auto-crl-update.

Default 

none

Parameters 
ca-profile-name—
Specifies the name of the Certificate Authority profile.

Show Commands

cert-profile

Syntax 
cert-profile name association
cert-profile [name]
cert-profile name entry [1..8]
Context 
show>ipsec
Description 

This command displays IPsec certificate profile information.

Parameters 
name—
Specifies an existing cert-profile name.
association—
Displays information for which this IPSec certificate profile is associated.
entry [1..8]—
Displays information for the specified entry.
Output 

The following is an example output of the show ipsec cert-profile command.

Sample Output
*A:Dut-A# show ipsec cert-profile cert "cert-1.der"
==============================================================================
Certificate Profile Entry
==============================================================================
Id Cert Key Status Flags
------------------------------------------------------------------------------
1 cert-1.der key-1.der
==============================================================================
*A:Dut-A#
*A:Dut-A# show ipsec cert-profile "cert-1.der" entry 1
===============================================================================
IPsec Certificate Profile: cert-1.der Entry: 1 Detail
===============================================================================
Cert File : cert-1.der
Key File : key-1.der
Status Flags : (Not Specified)
Comp Chain : complete
Compute Chain CA Profiles
-------------------------------------------------------------------------------
CA10
CA9
CA8
CA7
CA6
===============================================================================
*A:Dut-A# exit

certificate

Syntax 
certificate filename association
Context 
show
show>ipsec
Description 

This command displays certificate-related information.

Parameters 
filename—
Specifies the certificate file name.
association—
Displays information for which this IPSec certificate is associated.
Output 

The following is an example output of the show certificate command.

Sample Output
*A:Dut-B# show certificate ca-profile
-------------------------------------------------------------------------------
Max Cert Chain Depth: 7 (default)
-------------------------------------------------------------------------------
Certificate Display Format: 1 ASCII
===============================================================================
CA Profile
===============================================================================
CA Profile Admin Oper Cert File CRL File
State State
-------------------------------------------------------------------------------
CA0 up up CA1-00cert.der CA1-00crl.der
CA1 up up CA1-01cert.der CA1-01crl.der
CA2 up up CA1-02cert.der CA1-02crl.der
CA3 up up CA1-03cert.der CA1-03crl.der
CA4 up up CA1-04cert.der CA1-04crl.der
CA5 up up rsa_sha512_1024_0cert.d* rsa_sha512_1024_0crl.der
CA6 up up rsa_sha512_1024_1cert.d* rsa_sha512_1024_1crl.der
CA7 up up rsa_sha512_1024_2cert.d* rsa_sha512_1024_2crl.der
CA8 up up rsa_sha512_1024_3cert.d* rsa_sha512_1024_3crl.der
CA9 up up rsa_sha512_1024_4cert.d* rsa_sha512_1024_4crl.der
CA10 up up rsa_sha512_1024_5cert.d* rsa_sha512_1024_5crl.der
CA11 up up rsa_sha384_1024_0cert.d* rsa_sha384_1024_0crl.der
CA12 up up rsa_sha384_1024_1cert.d* rsa_sha384_1024_1crl.der
CA13 up up rsa_sha384_1024_2cert.d* rsa_sha384_1024_2crl.der
CA14 up up rsa_sha384_1024_3cert.d* rsa_sha384_1024_3crl.der
CA15 up up rsa_sha384_1024_4cert.d* rsa_sha384_1024_4crl.der
CA16 up up rsa_sha384_1024_5cert.d* rsa_sha384_1024_5crl.der
CMPv2 up up rsaCMPv2cert.der rsaCMPv2CRL.der
-------------------------------------------------------------------------------
Entries found: 18
===============================================================================
* indicates that the corresponding row element may have been truncated.
*A:Dut-B#
*A:Dut-B# show ipsec certificate cert-1.der association
===============================================================================
Associated Tunnels
===============================================================================
Tunnel SvcId Sap Admin
-------------------------------------------------------------------------------
tun-1-s-cert-v2 3 tunnel-1.private:3 Up
tun-1-s-cert-MTA-v2 8 tunnel-1.private:7 Up
tun-1-s-cert-i_op-ss-v2 42 tunnel-1.private:10 Up
tun-1-s-cert-MTA-i_op-ss-v2 48 tunnel-1.private:11 Up
-------------------------------------------------------------------------------
IPsec Tunnels: 4
===============================================================================
*A:Dut-B#

In the following example, the "cert-1.der" is the certificate-profile name, where as above the cert-1.der is the actual file in use.

*A:Dut-B# show ipsec cert-profile association "cert-1.der"
===============================================================================
IPsec tunnels using certificate profile
===============================================================================
SvcId Type SAP Tunnel
-------------------------------------------------------------------------------
3 vprn tunnel-1.private:3 tun-1-s-cert-v2
8 vprn tunnel-1.private:7 tun-1-s-cert-MTA-v2
42 vprn tunnel-1.private:10 tun-1-s-cert-i_op-ss-v2
48 vprn tunnel-1.private:11 tun-1-s-cert-MTA-i_op-ss-v2
===============================================================================
Number of tunnel entries: 4
===============================================================================
===============================================================================
IPsec gateways using certificate profile
===============================================================================
SvcId Type SAP Gateway
-------------------------------------------------------------------------------
1057 vprn tunnel-1.public:18 d-cert-MTA-g1-1-v2
1092 vprn tunnel-1.public:21 d-cert-i_op-ss-g1-1-v2
===============================================================================
Number of gateway entries: 2
===============================================================================
*A:Dut-B#

gateway

Syntax 
gateway name name
gateway [service service-id]
gateway tunnel [ip-address:port]
gateway name name tunnel ip-address:port
gateway name name tunnel
gateway [name name] tunnel state state
gateway [name name] tunnel idi-value idi-prefix
gateway tunnel count
Context 
show>ipsec
Description 

This command displays IPSec gateway information.

Parameters 
name name
Specifies an IPSec gateway name.
service service-id
specifies the service ID of the default security service used by the IPSec gateway.
Values—
1 — 214748364
svc-name: 64 char max
tunnel ip-address:port
Specifies to display the IP address and UDP port of the SAP IPSec gateway to the tunnel.
Values—
port: 0— 65535
state state
Specifies the state of the tunnel, up or down.
idi-value idi-prefix
Specifies a string as an IDi prefix. With this parameter, the system will list all peer’s with IDi that has specified prefixes.
count—
Specifies to display the number of IPSec gateway tunnels with the ike-policy>auth-method command set to psk.
Output 

The following is an example output of the show ipsec gateway command.

Sample Output
show ipsec gateway
===============================================================================
IPSec Gateway
===============================================================================
Name LclGwAddr Adm Opr Ike Auth
SAP Service
-------------------------------------------------------------------------------
rw 172.16.100.1 Up Up 2 certRadius
tunnel-1.public:100 300
-------------------------------------------------------------------------------
Number of gateways: 1
===============================================================================
show ipsec gateway name "rw"
===============================================================================
IPSec Gateway (SAP)
===============================================================================
-------------------------------------------------------------------------------
IPSec Gateway ( rw )
-------------------------------------------------------------------------------
Sap : tunnel-1.public:100 Service : 300
Local GW : 172.16.100.1
Admin State : Up Oper State : Up
Def Secure Svc : 400
Def Secure Svc If : priv
Ike Policy Id : 2
Ike Version : 2 Ike Policy Auth : certRadius
Pre Shared Key : haha
X509 Cert : (Not Specified)
Key : (Not Specified)
Local Id Type : fqdn
Local Id Value : segwmobilelab.alu.com
Cert Profile : segw-mlab
Trust Anchor Prof : sc-root
Radius Acct Plcy : rad-acct-policy-1
Radius Auth Plcy : rad-auth-policy-1
TS-List : <none>
Certificate Status Verify
-------------------------------------------------------------------------------
Primary : crl Secondary : none
Default Result : good
-------------------------------------------------------------------------------
Template Id: 1
-------------------------------------------------------------------------------
Transform Id1 : 1 Transform Id2 : None
Transform Id3 : None Transform Id4 : None
Reverse Route : none Replay Window : None
IP MTU : max Encap IP MTU : max
Pkt Too Big : true Clear DF BIT : false
Pkt Too Big Number : 100 Pkt Too Big Intvl : 10 secs
===============================================================================
show ipsec gateway name "rw" tunnel
===============================================================================
IPsec Remote User Tunnels
===============================================================================
Remote Endpoint Addr GW Name
GW Lcl Addr SvcId TnlType
Private Addr Secure SvcId BiDirSA
Idi-Type Value*
-------------------------------------------------------------------------------
11.0.0.100:500 rw
172.16.100.1 300 certRadius
2001:beef::50 400 true
derAsn1Dn C=US,ST=CA,O=ALU,CN=Smallcell-1
-------------------------------------------------------------------------------
IPsec Gateway Tunnels: 1
===============================================================================
show ipsec gateway name "rw" tunnel 11.0.0.100
===============================================================================
IPsec Remote Users Tunnel Detail
===============================================================================
-------------------------------------------------------------------------------
IP Addr: 11.0.0.100, port: 500
-------------------------------------------------------------------------------
Service Id : 300 Sap Id : tunnel-1.public:100
Address : 11.0.0.100
Private If : priv
Private Address : 2001:beef::50
Private Service : 400 Template Id : 1
Replay Window : None Bi Direction SA : true
Host MDA : 1/2
Match TrustAnchor: smallcell-root
Last Oper Changed: 12/05/2014 23:01:48
IKE IDI Type : derAsn1Dn
IKE IDI Value : C=US,ST=CA,O=ALU,CN=Smallcell-1
-------------------------------------------------------------------------------
Dynamic Keying Parameters
-------------------------------------------------------------------------------
Transform Id1 : 1 Transform Id2 : None
Transform Id3 : None Transform Id4 : None
IPsec GW Name : rw
Local GW Address : 172.16.100.1
Ike Policy Id : 2 Ike Pol Auth : certRadius
Pre Shared Key : haha
Cert Profile : segw-mlab
Trust Anchor Prof: sc-root
Selected Cert : SeGW-MLAB.cert
Selected Key : SeGW-MLAB.key
Send Chain Prof : None
Local Id Type : fqdn
Local Id Value : segwmobilelab.alu.com
Radius Acct Plcy : rad-acct-policy-1
Radius Auth Plcy : rad-auth-policy-1
TS-List : <none>
Certificate Status Verify
-------------------------------------------------------------------------------
Primary : crl Secondary : none
Default Result : good
-------------------------------------------------------------------------------
ISAKMP-SA
-------------------------------------------------------------------------------
State : Up
Established : 12/05/2014 23:01:49 Lifetime : 86400
Expires : 12/06/2014 23:01:49
ISAKMP Statistics
--------------------
Tx Packets : 2 Rx Packets : 2
Tx Errors : 0 Rx Errors : 0
Tx DPD : 0 Rx DPD : 0
Tx DPD ACK : 0 Rx DPD ACK : 0
DPD Timeouts : 0 Rx DPD Errors : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Inbound (index 2)
-------------------------------------------------------------------------------
SPI : 203073
Auth Algorithm : Sha1 Encr Algorithm : Aes128
Installed : 12/05/2014 23:01:48 Lifetime : 3600
Local Traffic Selectors:
2003:dead::1-2003:dead::1
Remote Traffic Selectors:
2001:beef::50-2001:beef::50
Aggregate Statistics
--------------------
Bytes Processed : 0 Packets Processed: 0
Crypto Errors : 0 Replay Errors : 0
SA Errors : 0 Policy Errors : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Outbound (index 1)
-------------------------------------------------------------------------------
SPI : 3232561216
Auth Algorithm : Sha1 Encr Algorithm : Aes128
Installed : 12/05/2014 23:01:48 Lifetime : 3600
Local Traffic Selectors:
2003:dead::1-2003:dead::1
Remote Traffic Selectors:
2001:beef::50-2001:beef::50
Aggregate Statistics
--------------------
Bytes Processed : 0 Packets Processed: 0
Crypto Errors : 0 Replay Errors : 0
SA Errors : 0 Policy Errors : 0
===============================================================================
Fragmentation Statistics
===============================================================================
Encapsulation Overhead : 73
Pre-Encapsulation
Fragmentation Count : 0
Last Fragmented Packet Size : 0
Post-Encapsulation
Fragmentation Count : 0
Last Fragmented Packet Size : 0
===============================================================================
===============================================================================

tunnel

Syntax 
tunnel [gre-tunnel-name]
Context 
show>gre
Description 

This command displays information about a particular GRE tunnel or all GRE tunnels.

Parameters 
gre-tunnel-name—
Specifies the name of a GRE tunnel.
Output 

Table 25 lists the information displayed for each GRE tunnel.

Table 25:  Show GRE Tunnel Output Fields  

Label

Description

TunnelName (Tunnel Name)

The name of the GRE tunnel.

SvcID (Service ID)

The service ID of the IES or VPRN service that owns the GRE tunnel.

SapId (Sap ID)

The ID of the private tunnel SAP that owns the GRE tunnel.

Description

The description for the GRE tunnel.

LocalAddress (Source Address)

The source address of the GRE tunnel (public/outer IP)

RemoteAddress (Remote Address)

The destination address of the GRE tunnel (public/outer IP)

Bkup RemAddr (Backup Address)

The backup destination address of the GRE tunnel (public/outer IP)

To (Target Address)

The remote address of the GRE tunnel (private/inner IP). This is the peer’s IP address to the GRE tunnel. This comes from the tunnel configuration.

DlvrySvcId (Delivery Service)

The service ID of the IES or VPRN service that handles the GRE encapsulated packets belonging to the tunnel.

DSCP

The forced DSCP codepoint in the outer IP healer of GRE encapsulated packets belonging to the tunnel.

Admn (Admin State)

Admin state of the tunnel (up/down).

Oper (Operational State)

Operational state of the tunnel (up/down).

Oper Rem Addr (Oper Remote Addr)

The destination address of the GRE tunnel (public/outer IP) that is currently being used.

Pkts Rx

Number of GRE packts received belonging to the tunnel.

Pkts Tx

Number of GRE packets transmitted belonging to the tunnel.

Bytes Rx

Number of bytes in received GRE packets associated with the tunnel.

Bytes Tx

Number of bytes in transmitted GRE packets associated with the tunnel.

Key Ignored Rx

Incremented every time a GRE packet is received with a GRE key field.

Too Big Tx

Incremented every time an IP packet with DF=1 is to be forwarded into the GRE tunnel and its size exceeds the interface IP MTU.

Seq Ignored Rx

Incremented every time a GRE packet is received with a sequence number.

Vers Unsup. Rx

Incremented every time a GRE packet is dropped because the GRE version is unsupported.

Invalid Chksum Rx

Incremented every time a GRE packet is dropped because the checksum is invalid.

Loops Rx

Incremented eery time a GRE packet is dropped because the destination IP address of the un-encapsulated packet would cause it be re-encapsulated into the same tunnel.

Sample Output
dut-A# show gre tunnel
===============================================================================
GRE Tunnels
===============================================================================
TunnelName LocalAddress SvcId Admn
SapId RemoteAddress DlvrySvcId Oper
To Bkup RemAddr DSCP Oper Rem Addr
-------------------------------------------------------------------------------
toce2 50.1.1.7 500 Up
tunnel-1.private:1 30.1.1.3 500 Up
20.1.1.2 30.1.2.7 None 30.1.1.3
toce2_backup 50.1.2.3 502 Up
tunnel-1.private:3 30.1.1.3 502 Up
20.1.2.2 0.0.0.0 None 30.1.1.3
-------------------------------------------------------------------------------
GRE Tunnels: 2
===============================================================================
A:Dut-A# show gre tunnel "toce2"
===============================================================================
GRE Tunnel Configuration Detail
===============================================================================
Service Id : 500 Sap Id : tunnel-1.private:1
Tunnel Name : toce2
Description : None
Target Address : 20.1.1.2 Delivery Service : 500
Admin State : Up Oper State : Up
Source Address : 50.1.1.7 Oper Remote Addr : 30.1.1.3
Remote Address : 30.1.1.3 Backup Address : 30.1.2.7
DSCP : None
Oper Flags : None
===============================================================================
GRE Tunnel Statistics: toce2
===============================================================================
Errors Rx : 0 Errors Tx : 0
Pkts Rx : 165342804 Pkts Tx : 605753463
Bytes Rx : 84986201256 Bytes Tx : 296819196870
Key Ignored Rx : 0 Too Big Tx : 0
Seq Ignored Rx : 0
Vers Unsup. Rx : 0
Invalid Chksum Rx: 0
Loops Rx : 0
===============================================================================
===============================================================================
A:Dut-A# show gre tunnel count
--------------------------------------------------------------------------------
GRE Tunnels: 2
--------------------------------------------------------------------------------

ike-policy

Syntax 
ike-policy ike-policy-id
ike-policy
Context 
show>ipsec
Description 

This command displays

Parameters 
ike-policy-id—
Specifies the ID of an IKE policy entry.
Values—
1 — 2048
Output 

The following is an example output for the show ipsec ike-policy command.

Sample Output
*A:ALA-48# show ipsec ike-policy 10
===============================================================================
IPsec IKE policy Configuration Detail
===============================================================================
Policy Id : 10 IKE Mode : main
DH Group : Group2 Auth Method : psk
PFS : False PFS DH Group : Group2
Auth Algorithm : Sha1 Encr Algorithm : Aes128
ISAKMP Lifetime : 86400 IPsec Lifetime : 3600
NAT Traversal : Disabled
NAT-T Keep Alive : 0 Behind NAT Only : True
DPD : Disabled
DPD Interval : 30 DPD Max Retries : 3
Description : (Not Specified)
===============================================================================
*A:ALA-48#

lockout

Syntax 
lockout router router-id local-gateway-address local-gateway-address mda mda
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
lockout router router-id mda mda
Context 
show>ipsec
Description 

This command displays the lockout status for the specified IPSec clients. If remote address information is not specified, the system will display a list of clients that have been locked out on the specified ISA, along with the IPSec gateway if local-gateway-address is specified.

Parameters 
router-id—
The ID of the router where the IPSec gateway is configured
local-gateway-address—
The IP address of the local IPSec gateway
mda—
The MDA ID of the ISA
ip-address—
The IP address of the remote client
port—
The port of the remote client
Output 

The following output is an example of lockout information.

Sample Output
show ipsec lockout router 300 local-gateway-address 172.16.100.1 remote
192.168.61.100:500
===============================================================================
IPsec Lockout Client
===============================================================================
Lockout : True
Router ID             : 300
Local Gateway Address : 172.16.100.1
Lockout Client Address: 192.168.61.100
Lockout Client Port : 500
No. of Failed Attempts: 2
No. of Dropped Packets: 2
Remaining Block Time : 289 seconds
===============================================================================

radius-accounting-policy

Syntax 
radius-accounting-policy [name]
Context 
show>ipsec
Description 

This command displays RADIUS accounting-policy related information.

Parameters 
name—
Specifies an existing RADIUS accounting policy.
Output 

The following is an example output for the show ipsec radius-acounting-policy command.

Sample Output
show ipsec radius-accounting-policy
===============================================================================
Radius Accounting Policy
===============================================================================
Policy Name Server Policy Include Attribs Upd Int
Jitter
-------------------------------------------------------------------------------
rad-acct-policy-1 nasId nasPortId 20
framedIpAddr
10
===============================================================================
Number of entries: 1
===============================================================================
show ipsec radius-accounting-policy "rad-acct-policy-1"
===============================================================================
IPsec Radius Accounting Policy Detail
===============================================================================
Name : rad-acct-policy-1
Server Policy : (Not Specified)
Include Attr : nasId nasPortId framedIpAddr
Update Interval : 20
Jitter : 10 sec.
===============================================================================

radius-authentication-policy

Syntax 
radius-authentication-policy [name]
Context 
show>ipsec
Description 

This command displays IPSec RADIUS authentication policy information.

Parameters 
name—
Specifies an existing RADIUS authentication policy.

security-policy

Syntax 
security-policy service-id [security-policy-id]
security-policy
Context 
show>ipsec
Description 

This command displays

Parameters 
service-id—
Specifies the service-id of the tunnel delivery service.
Values—
1 — 214748364
svc-name: 64 char max
security-policy-id—
Specifies the IPSec security policy entry that this tunnel will use.
Values—
1 — 8192
Output 

The following is an example output for the show ipsec security-policy command.

Sample Output
*A:ALA-48>show>ipsec# security-policy 1
========================================================================
Security Policy Param Entries
========================================================================
SvcId Security Policy LocalIp RemoteIp
PlcyId ParamsId
------------------------------------------------------------------------
1 1 1 0.0.0.0/0 0.0.0.0/0
------------------------------------------------------------------------
No. of IPsec Security Policy Param Entries: 1
========================================================================
*A:ALA-48>show>ipsec#

static-sa

Syntax 
static-sa
static-sa name sa-name
static-sa spi spi
Context 
show>ipsec
Description 

This command displays IPSec static-SA information.

Parameters 
sa-name—
Specifies the SA name.
Values—
32 chars max
spi—
Specifies the spi.
Values—
256..16383

transform

Syntax 
transform [transform-id]
Context 
show>ipsec
Description 

This command displays IPSec transforms.

Parameters 
transform-id—
Specifies an IPSec transform entry.
Values—
1 — 2048
Output 

The following is an example output for the show ipsec transform command.

Sample Output
*A:ALA-48>config>ipsec# show ipsec transform 1
================================================================
IPsec Transforms
================================================================
TransformId EspAuthAlgorithm EspEncryptionAlgorithm
----------------------------------------------------------------
1 Sha1 Aes128
----------------------------------------------------------------
No. of IPsec Transforms: 1
================================================================
*A:ALA-48>config>ipsec#

trust-anchor-profile

Syntax 
trust-anchor-profile [trust-anchor-profile] association
trust-anchor-profile [trust-anchor-profile]
Context 
show>ipsec
Description 

This command displays trust anchor profile information.

Parameters 
trust-anchor-profile—
Specifies the trust anchor profile name up to 32 characters in length.
association—
Displays information for which this trust anchor profile is associated.
Output 

The following is an example output for the show ipsec trust-anchor-profile command.

Sample Output
*A:Dut-A# show ipsec trust-anchor-profile
==================================================================
Trust Anchor Profile Information
==================================================================
Name CA Profiles Down
------------------------------------------------------------------
CA0wCMPv2 0
CA1wCMPv2 0
CA2wCMPv2 0
CA3wCMPv2 0
CA4wCMPv2 0
CA5wCMPv2 0
CA6wCMPv2 0
CA7wCMPv2 0
CA8wCMPv2 0
CA9wCMPv2 0
CA10wCMPv2 0
==================================================================
*A:Dut-A#
*A:Dut-A# show ipsec trust-anchor-profile
==================================================================
Trust Anchor CA-profile List
==================================================================
CA Profile Admin/Oper State
------------------------------------------------------------------
CA6 up/up
CMPv2 up/up
==================================================================
*A:Dut-A#

ts-list

Syntax 
ts-list [list-name]
ts-list list-name association
ts-list list-name local-entry [1..32]
ts-list list-name remote-entry [1..32]
ts-list list-name {local | remote}
Context 
show>ipsec
Description 

This command displays IPSec traffic-selector list (TS-list) information.

Entering this command without a parameter will list all configured TS-lists.

Entering this command with the association parameter will list all IPSec gateways that use the specified TS-list.

Entering this command with the local or local-entry parameter will list all or specified local entries of the specified TS-list.

Entering this command with the remote or remote-entry parameter will list all or specified remote entries of the specified TS-list.

Parameters 
list-name—
The traffic-selector list name
association—
Displays all associations of the TS-list
local-entry [1..32]—
The entry ID of a local entry
remote-entry [1..32]—
The entry ID of a remote entry
local—
Displays all local entries
remote—
Displays all remote entries
Output 

The following output is an example of TS-list information.

Sample Output
show ipsec ts-list
===============================================================================
Traffic Selector List
===============================================================================
TS-List
-------------------------------------------------------------------------------
fullts
===============================================================================
*A:vsim-02-cpm# show ipsec ts-list "fullts"
===============================================================================
TS-List "fullts" Local Entries Information
===============================================================================
Entry ID : 1
Status : Invalid
Protocol ID : Not Specified
Protocol Port Range: Not Specified
Prefix/Len : 10.10.10.1/32
-------------------------------------------------------------------------------
Entry ID : 2
Status : Valid
Protocol ID : tcp
Protocol Port Range: 80 - 80
Prefix/Len : 10.10.10.2/32
-------------------------------------------------------------------------------
No. of entries: 2
===============================================================================
===============================================================================
TS-List "fullts" Remote Entries Information
===============================================================================
Entry ID : 1
Status : Valid
Protocol ID : tcp
Protocol Port Range: any
Prefix/Len : 0.0.0.0/0
-------------------------------------------------------------------------------
No. of entries: 1
===============================================================================

tunnel

Syntax 
tunnel ipsec-tunnel-name
tunnel
Context 
show>ipsec
Description 

This command displays

Parameters 
ipsec-tunnel-name—
Specifies the name of the tunnel up to 32 characters in length.

tunnel-template

Syntax 
tunnel-template [ipsec template identifier]
Context 
show>ipsec
Description 

This command displays

Parameters 
ipsec template identifier—
Displays an existing IPSec tunnel template ID.
Values—
1 — 2048
Output 

The following is an example output for the show ipsec tunnel-template command.

Sample Output
*A:ALA-48>config>ipsec# show ipsec tunnel-template 1
===============================================================================
IPSec Tunnel Template
===============================================================================
Id Trnsfrm1 Trnsfrm2 Trnsfrm3 Trnsfrm4 ReverseRoute ReplayWnd
-------------------------------------------------------------------------------
1 1 none none none useSecurityPolicy 128
-------------------------------------------------------------------------------
Number of templates: 1
===============================================================================
*A:ALA-48>config>ipsec#

mc-ipsec

Syntax 
mc-ipsec peer ip-address tunnel-group tunnel-group-id
mc-ipsec peer ip-address
Context 
show>redundancy>multi-chassis
Description 

This command displays the 7750 SR IPSec multi-chassis states. Optionally, only state of specified tunnel-group will be displayed.

Parameters 
ip-address—
Specifies the peer address.
tunnel-group-id—
Specifies the tunnel-group.
Output 

Table 26 describes show redundancy multi-chassis mc-ipsec output fields.

Table 26:  Show MC-IPSec Peer Output Fields  

Label

Description

Admin State

Displays the admin state of mc-ipsec.

Mastership/Master State

Displays the current MIMP state.

Protection Status

Displays nominal or notReady.

notReady means the system is not ready for a switchover. There could be major traffic impact if switchover happens in case of notReady.

nominal means the tunnel-group is in a better situation to switchover than notReady. However there still might be traffic impact.

Installed

Displays the number of tunnels that has been successfully installed on MS-ISA

Installing

Displays the number of tunnels that are being installed on MS-ISA.

Awaiting Config

Displays the number of synced tunnels that do not have corresponding configuration ready

Failed

Displays the number of tunnels that have been failed to installed on MS-ISA.

Sample Output
show redundancy multi-chassis mc-ipsec peer 2.2.2.2
===============================================================================
Multi-Chassis MC-IPsec
===============================================================================
Peer Name : (Not Specified)
Peer Addr : 2.2.2.2
Keep Alive Intvl: 1.0 secs Hold on Nbr Fail : 3
Discovery Intvl : 300 secs Discovery Boot Intvl : 300 secs
BFD : Disable
Last update : 09/27/2012 00:44:23
======================================================================
Multi-Chassis IPsec Multi Active Tunnel-Group Table
======================================================================
ID Peer Group Priority Admin State Mastership
----------------------------------------------------------------------
1 2 100 Up standby
----------------------------------------------------------------------
Multi Active Tunnel Group Entries found: 1
======================================================================
show redundancy multi-chassis mc-ipsec peer 2.2.2.2 tunnel-group 1
===============================================================================
Multi-Chassis MC-IPsec Multi Active Tunnel-Group: 1
===============================================================================
Peer Ex Tnl Grp : 2 Priority : 100
Master State : standby Protection Status : nominal
Admin State : Up Oper State : Up
===============================================================================
======================================================================
Multi-Chassis Tunnel Statistics
======================================================================
Static Dynamic
----------------------------------------------------------------------
Installed 1 0
Installing 0 0
Awaiting Config 0 0
Failed 0 0
======================================================================

Debug Commands

gateway

Syntax 
gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]] [detail] [no-dpd-debug]
no gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]
gateway name name tunnel-subnet ip-prefix/ip-prefix-length [port port] [detail] [no-dpd-debug]
no gateway name name tunnel-subnet ip-prefix/ip-prefix-length
Context 
debug>ipsec
Description 

This command enables debugging for dynamic IPSec tunnels that terminate on the specified IPSec gateway.

The tunnel to be debugged can be specified by either its source address or source subnet. If a subnet is specified, the system will enable debugging for all tunnels with source addresses in the specified subnet.

Parameters 
name—
The name of the IPSec gateway
ip-address:port —
The tunnel IP address of the remote peer and, optionally, the remote UDP port of IKE
nat-ip:port—
The inside IP address of the NAT tunnel and, optionally, the port.
detail—
Specifies to display detailed debug information
no-dpd-debug—
Specifies to stop logging IKEv1 and IKEv2 DPD events during debug in order to produce less noise
ip-prefix/ip-prefix-length—
The subnet of the peer’s tunnel address

tunnel

Syntax 
tunnel ipsec-tunnel-name [detail] [no-dpd-debug]
no tunnel ipsec-tunnel-name
Context 
debug>ipsec
Description 

This command enables debugging for specified IPSec tunnel.

Note:

Only one IPSec tunnel is allowed to enable debugging at a time.

Parameters 
ipsec-tunnel-name—
Specifies the name of ipsec-tunnel.
detail—
Displays detailed debug information.
no-dpd-debug—
Stops logging IKEv1 and IKEv2 DPD events for less noise during debug.

certificate

Syntax 
certificate filename
Context 
debug>ipsec
Description 

This command enables debug for certificate chain computation in cert-profile.

Parameters 
filename—
Displays the filename of imported certificate.

cmpv2

Syntax 
cmpv2
Context 
debug
Description 

This command enables the context to perform CMPv2 operations.

ca-profile

Syntax 
[no] ca-profile profile-name
Context 
debug>cmpv2
Description 

This command debugs output of the specificied CA profile.

  1. Protection method of each message is logged.
  2. All HTTP messages are logged. Format allows offline analysis using Wireshark.
  3. In the event of failed transactions, saved certificates are not deleted from file system for further debug and analysis.
  4. The system allows CMPv2 debugging for multiple ca-profile at the same time.

ocsp

Syntax 
[no] ocsp ca-profile-name
Context 
debug
Description 

This command enable debug output of OCSP protocol for the specified CA

Default 

no ocsp

Parameters 
ca-profile-name—
Specifies the name of an existing ca-profile.

Tools Commands

mc-ipsec

Syntax 
mc-ipsec
Context 
tools>perform>redundancy>multi-chassis>
Description 

This command enables the 7750 SR mc-ipsec context.

force-switchover

Syntax 
force-switchover tunnel-group local-group-id [now] [to {master | standby}]
Context 
tools>perform>redundancy>multi-chassis>mc-ipsec
Description 

This command manually switches over the 7750 SR mc-ipsec mastership of specified tunnel-group.

Parameters 
local-group-id—
Specifies the local tunnel-group id configured in the config>redundancy>multi-chassis>peer>mc-ipsec context.
now—
This optional parameter removes the prompt of confirmation.
to {master | standby}—
specifies the desired mastership state to be achieved following a forced switch between this tunnel group and its redundant peer. If the target state matches the current state when the switch is attempted, then no switch will occur.

ike-initiate

Syntax 
ike-initiate tunnel-group-id ipsec-group-id
ike-initiate tunnel-name ipsec-tunnel-name
Context 
tools>perform>ipsec
Description 

This command initiates tunnel setup for the specified LAN-to-LAN tunnel or for all static LAN-to-LAN tunnels in the specified tunnel group. This command initiates tunnel setup regardless of the configuration of the ipsec-responder-only command under the specified tunnel group.

The command only initiates tunnel setup when the tunnel group is in the MC-IPSec master state, or if MC-IPSec is not enabled for the tunnel group. If MC-IPSec is enabled and the tunnel group is not in the master state, the system will abort tunnel setup if MIMP goes down or if mastership changes during the tunnel setup.

Operationally up tunnels are not affected by this command. The system will not try to initiate a tunnel setup if the tunnel’s operation flags are not clear.

The system does not automatically retry tunnel setup if a tunnel setup fails.

Default 

n/a

Parameters 
ipsec-group-id—
The ID of the tunnel group where all static LAN-to-LAN tunnels are initiated
ipsec-tunnel-name—
The name of the IPSec tunnel to be initiated

Clear Commands

lockout

Syntax 
lockout router router-id
lockout router router-id local-gateway-address local-gateway-address
lockout router router-id local-gateway-address local-gateway-address remote ip-address[:port]
Context 
clear>ipsec
Description 

This command clears the lockout state for the specified clients. If remote address information is not specified, the system will clear the lockout state for all clients within the specified routing instance, along with all clients within the specified IPSec gateway if local-gateway-address is specified.

Parameters 
router-id—
The ID of the router where the IPSec gateway is configured
local-gateway-address—
The IP address of the local IPSec gateway
ip-address—
The IP address of the remote client
port—
The port of the remote client