Enter the ipsec context
16.0.R4
All
Enter the cert-profile list instance
configure ipsec cert-profile string
10200
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Certificate profile name.
configure ipsec cert-profile string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Administrative state of the certificate profile.
configure ipsec cert-profile string admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the entry list instance
configure ipsec cert-profile string entry number
8
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Certificate profile entry ID
configure ipsec cert-profile string entry number
1 to 8
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Certificate file name for the certificate profile entry
configure ipsec cert-profile string entry number cert string
1 to 95
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
File name of imported key used for authentication
configure ipsec cert-profile string entry number key string
1 to 95
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Signature scheme for the RSA key
configure ipsec cert-profile string entry number rsa-signature keyword
pkcs1
pkcs1, pss
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the send-chain context
configure ipsec cert-profile string entry number send-chain
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
CA certificate to send to the peer
configure ipsec cert-profile string entry number send-chain ca-profile reference
configure system security pki ca-profile string
7
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the client-db list instance
1000
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IPsec client database name.
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative state of the client database.
configure ipsec client-db string admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the client list instance
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Client ID
1 to 8000
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative state of the database client.
configure ipsec client-db string client number admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Client name
configure ipsec client-db string client number client-name string
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the credential context
configure ipsec client-db string client number credential
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Pre-shared key used to authenticate peers
configure ipsec client-db string client number credential pre-shared-key string
1 to 115
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the identification context
configure ipsec client-db string client number identification
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the idi context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any IDi value as a match
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
FQDN used as the match criteria for the IDi
0 to 255
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
FQDN suffix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi fqdn-suffix string
0 to 255
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IPv4 prefix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi ipv4-prefix string
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv4 prefix as a match for the IDi
configure ipsec client-db string client number identification idi ipv4-prefix-any boolean
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IPv6 prefix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi ipv6-prefix string
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv6 prefix as a match for the IDi
configure ipsec client-db string client number identification idi ipv6-prefix-any boolean
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Email address (RFC 822) used as match criteria for IDi
0 to 255
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Email address domain (RFC 822) as IDi match criteria
configure ipsec client-db string client number identification idi rfc822-suffix string
0 to 255
The following are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the peer-ip-prefix context
configure ipsec client-db string client number identification peer-ip-prefix
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IP prefix used as the match criteria
configure ipsec client-db string client number identification peer-ip-prefix ip-prefix (ipv4-prefix | ipv6-prefix)
The following are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv4 address as a match
configure ipsec client-db string client number identification peer-ip-prefix ipv4-only boolean
The following are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv6 address as a match
configure ipsec client-db string client number identification peer-ip-prefix ipv6-only boolean
The following are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Private interface name used for tunnel setup
configure ipsec client-db string client number private-interface string
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Name of the private service used for tunnel setup
configure ipsec client-db string client number private-service-name string
1 to 64
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Traffic selector list used by the tunnel
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Tunnel template ID
configure ipsec client-db string client number tunnel-template number
1 to 2048
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Text description
configure ipsec client-db string description string
1 to 80
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the match-list context
configure ipsec client-db string match-list
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Use IDi type in the IPsec client matching process
configure ipsec client-db string match-list idi boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Use the peer's tunnel IP address in matching process
configure ipsec client-db string match-list peer-ip-prefix boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the ike-policy list instance
configure ipsec ike-policy number
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The unique identifier of an IKE policy.
configure ipsec ike-policy number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Text description
configure ipsec ike-policy number description string
1 to 80
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the dpd context
configure ipsec ike-policy number dpd
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
DPD interval
configure ipsec ike-policy number dpd interval number
10 to 300
30
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum number of retries before the tunnel is removed
configure ipsec ike-policy number dpd max-retries number
2 to 5
3
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Initiate DPD request for incoming ESP or IKE packets
configure ipsec ike-policy number dpd reply-only boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IKE transform instance associated with the IKE policy
configure ipsec ike-policy number ike-transform reference
configure ipsec ike-transform number
4
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the ike-version-1 context
configure ipsec ike-policy number ike-version-1
The following are part of a choice: ike-version-1 or ike-version-2.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method used with the IKE policy
configure ipsec ike-policy number ike-version-1 auth-method keyword
psk
psk, plain-psk-xauth
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Mode of operation
configure ipsec ike-policy number ike-version-1 ike-mode keyword
main
main, aggressive
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method used with policy on its own side
configure ipsec ike-policy number ike-version-1 own-auth-method keyword
symmetric
symmetric
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Send delete notification for IKEv1 phase 1 removal
configure ipsec ike-policy number ike-version-1 ph1-responder-delete-notify boolean
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the ike-version-2 context
configure ipsec ike-policy number ike-version-2
The following are part of a choice: ike-version-1 or ike-version-2.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method used with the IKE policy
configure ipsec ike-policy number ike-version-2 auth-method keyword
psk
psk, cert, psk-radius, cert-radius, eap, auto-eap-radius, auto-eap
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method used for the remote peer
configure ipsec ike-policy number ike-version-2 auto-eap-method keyword
cert
psk, cert, psk-or-cert
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the ikev2-fragment context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum size of the IKEv2 packet
configure ipsec ike-policy number ike-version-2 ikev2-fragment mtu number
512 to 9000
1500
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Timeout for reassembly of IKEv2 message fragments
configure ipsec ike-policy number ike-version-2 ikev2-fragment reassembly-timeout number
1 to 5
2
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method used with IKE policy on own side
configure ipsec ike-policy number ike-version-2 own-auth-method keyword
symmetric
symmetric, psk, cert, eap-only
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Authentication method
configure ipsec ike-policy number ike-version-2 own-auto-eap-method keyword
cert
psk, cert
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Send IDr payload in last IKE authentication response
configure ipsec ike-policy number ike-version-2 send-idr-after-eap-success boolean
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Phase 1 lifetime for the IKE transform session
configure ipsec ike-policy number ipsec-lifetime number
1200 to 31536000
3600
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the limit-init-exchange context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Administrative state of limiting initial IKE exchanges
configure ipsec ike-policy number limit-init-exchange admin-state keyword
enable
enable, disable
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Max timeout for the in-progress initial IKE exchange
configure ipsec ike-policy number limit-init-exchange reduced-max-exchange-timeout (number | keyword)
2 to 60
2
seconds
none
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the lockout context
configure ipsec ike-policy number lockout
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Time a client is blocked for failed authentications
configure ipsec ike-policy number lockout block (number | keyword)
1 to 1440
10
minutes
infinite
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Time interval for failed attempts threshold
configure ipsec ike-policy number lockout duration number
1 to 60
5
minutes
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum failed authentications allowed in the duration
configure ipsec ike-policy number lockout failed-attempts number
1 to 64
3
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Max number of ports allowed behind the same IP address
configure ipsec ike-policy number lockout max-port-per-ip number
1 to 32000
16
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Check IKE peer ID during certificate authentication
configure ipsec ike-policy number match-peer-id-to-cert boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the nat-traversal context
configure ipsec ike-policy number nat-traversal
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable NAT-T in forced mode
configure ipsec ike-policy number nat-traversal force boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Continue sending keepalive packets (no expiry)
configure ipsec ike-policy number nat-traversal force-keep-alive boolean
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The keep alive interval for NAT-T.
configure ipsec ike-policy number nat-traversal keep-alive-interval number
120 to 600
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the pfs context
configure ipsec ike-policy number pfs
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The new Diffie-Hellman (DH) group used when each time the SA(Security Association) key is renegotiated.
configure ipsec ike-policy number pfs dh-group keyword
group-2
group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the relay-unsolicited-cfg-attribute context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Return the IPv4 address from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-address boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Return IPv4 DNS server address from source to client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-dns boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Return the IPv4 netmask from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-netmask boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Return the IPv6 address from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip6-address boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Return IPv6 DNS server address from source to client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip6-dns boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the ike-transform list instance
configure ipsec ike-transform number
4096
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The unique identifier of an IKE transform.
configure ipsec ike-transform number
1 to 4096
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Diffie-Helman group used to calculate session keys
configure ipsec ike-transform number dh-group keyword
group-2
group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IKE authentication algorithm for IKE transform instance
configure ipsec ike-transform number ike-auth-algorithm keyword
sha-1
md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, auth-encryption
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IKE encryption algorith for the IKE transform instance
configure ipsec ike-transform number ike-encryption-algorithm keyword
aes-128
des, des-3, aes-128, aes-192, aes-256, aes128-gcm8, aes128-gcm16, aes256-gcm8, aes256-gcm16
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
PRF algorithm for the IKE transform instance
configure ipsec ike-transform number ike-prf-algorithm keyword
same-as-auth
md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, same-as-auth
16.0.R6
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Phase 1 lifetime for the IKE transform instance
configure ipsec ike-transform number isakmp-lifetime number
1200 to 31536000
86400
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the ipsec-transform list instance
configure ipsec ipsec-transform number
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IPsec transform ID.
configure ipsec ipsec-transform number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The authentication algorithm for this IPsec transform.
configure ipsec ipsec-transform number esp-auth-algorithm keyword
sha-1
null, md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, auth-encryption
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Encryption algorithm for the IPsec transform session
configure ipsec ipsec-transform number esp-encryption-algorithm keyword
aes-128
null, des, des-3, aes-128, aes-192, aes-256, aes128-gcm8, aes128-gcm12, aes128-gcm16, aes192-gcm8, aes192-gcm12, aes192-gcm16, aes256-gcm8, aes256-gcm12, aes256-gcm16, null-aes128-gmac, null-aes192-gmac, null-aes256-gmac
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Phase 2 lifetime for the IPsec transform session
configure ipsec ipsec-transform number ipsec-lifetime number
1200 to 31536000
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Diffie-Hellman group used for PFS compilation
configure ipsec ipsec-transform number pfs-dh-group keyword
none, group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the radius context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the accounting-policy list instance
configure ipsec radius accounting-policy string
100
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
RADIUS accounting policy name
configure ipsec radius accounting-policy string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the include-radius-attribute context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include accounting attributes in RADIUS packets
configure ipsec radius accounting-policy string include-radius-attribute acct-stats boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Called-Station-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute called-station-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Calling-Station-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute calling-station-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Framed-IP-Address attribute
configure ipsec radius accounting-policy string include-radius-attribute framed-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Framed-IPv6-Prefix attribute
configure ipsec radius accounting-policy string include-radius-attribute framed-ipv6-prefix boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-Identifier attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-identifier boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-IP-Address attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-Port-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-port-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Referenced RADIUS server policy
configure ipsec radius accounting-policy string radius-server-policy reference
configure aaa radius server-policy string
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the update-interval context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The jitter of the update interval. If not specified, the system will use 10% of the update interval value
configure ipsec radius accounting-policy string update-interval jitter number
0 to 3600
seconds
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The update interval of the RADIUS accounting data. Zero specifies that no intermediate updates will be sent.
configure ipsec radius accounting-policy string update-interval value number
0 | 5 to 259200
10
minutes
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the authentication-policy list instance
100
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
RADIUS authentication policy name.
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the include-radius-attribute context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Called-Station-Id attribute
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Calling-Station-Id attribute
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the Subject-Key-Id attribute.
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-Identifier attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-identifier boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-IP-Address attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Include the NAS-Port-Id attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-port-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Password used in RADIUS access requests
configure ipsec radius authentication-policy string password string
1 to 115
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Referenced RADIUS server policy
configure ipsec radius authentication-policy string radius-server-policy reference
configure aaa radius server-policy string
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Show IPsec IKE and ESP keys.
configure ipsec show-ipsec-keys boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the static-sa list instance
1000
16.0.R6
All
Static Security Association (SA) name.
1 to 32
This element is part of a list key.
16.0.R6
All
Enable the authentication context
configure ipsec static-sa string authentication
16.0.R6
All
Authentication algorithm used for an IPsec manual SA
configure ipsec static-sa string authentication algorithm keyword
md5, sha1
This element is mandatory.
16.0.R6
All
Key used for the authentication algorithm
configure ipsec static-sa string authentication key string
1 to 54
This element is mandatory.
16.0.R6
All
Text description
configure ipsec static-sa string description string
1 to 32
16.0.R6
All
Direction to which the static SA entry can be applied
bidirectional
inbound, outbound, bidirectional
16.0.R6
All
IPsec protocol used with the static SA
esp
ah, esp
16.0.R6
All
Security Parameter Index (SPI) for the static SA
256 to 16383
16.0.R6
All
Enter the trust-anchor-profile list instance
configure ipsec trust-anchor-profile string
10128
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Trust anchor profile name.
configure ipsec trust-anchor-profile string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Add a list entry for trust-anchor
configure ipsec trust-anchor-profile string trust-anchor reference
8
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Name of the CA profile as a trust anchor profile
configure ipsec trust-anchor-profile string trust-anchor reference
configure system security pki ca-profile string
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the ts-list list instance
32768
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IPsec Traffic Selector (TS) list name.
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the local context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the entry list instance
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The unique ID of this TS list entry.
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the address context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IP prefix for address range in IKEv2 traffic selector
The following are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the range context
The following are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the IP address range for the entry
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The end IP address.
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the protocol context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Match any protocol ID
The following are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the id context
The following are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp6 context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp6 port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp6 port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp6 port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp6 port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the mipv6 context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The begin mobility header type.
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The end mobility header type.
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Protocol ID that accepts any port value
1 to 255
icmp, tcp, udp, icmp6, sctp, mipv6
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the sctp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the tcp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the udp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the remote context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the entry list instance
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The unique ID of this TS list entry.
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the address context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IP prefix for address range in IKEv2 traffic selector
The following are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the range context
The following are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the IP address range for the entry
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The end IP address.
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the protocol context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Match any protocol ID
The following are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the id context
The following are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp6 context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the mipv6 context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The begin mobility header type.
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
The end mobility header type.
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Protocol ID that accepts any port value
1 to 255
icmp, tcp, udp, icmp6, sctp, mipv6
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the sctp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the tcp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the udp context
The following are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Support OPAQUE ports
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable the port-range context
The following are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the tunnel-template list instance
configure ipsec tunnel-template number
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Tunnel template ID
configure ipsec tunnel-template number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Clear the Do-not-Fragment (DF) bit
configure ipsec tunnel-template number clear-df-bit boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable traffic class copy upon decapsulation
configure ipsec tunnel-template number copy-traffic-class-upon-decapsulation boolean
When configured to true, the system copies the traffic class from the outer tunnel IP packet header to the payload IP packet header in the decapsulating direction (public to private).
When configured to false, the system does not copy the traffic class from the outer IP packet to the payload IP packet header upon decapsulation.
false
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Text description
configure ipsec tunnel-template number description string
1 to 80
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum size of the encapsulated tunnel packet
configure ipsec tunnel-template number encapsulated-ip-mtu number
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp-generation context
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the frag-required context
Commands in this context configure the attributes for sending generated ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) back to the source, if the received size of the IPv4 packet on the private side exceeds the private MTU size.
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Administrative state of sending ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required admin-state keyword
This command sends the ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) back to the source if the received size of the IPv4 packet on the private side exceeds the private MTU size.
enable
enable, disable
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Interval for sending ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required interval number
This command configures the interval for sending ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4). The maximum number of messages that can be sent is configured by the message-count command.
1 to 60
10
seconds
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum number of ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required message-count number
This command configures the maximum number of ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) that can be sent during the period specified by the interval command.
10 to 1000
100
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the icmp6-generation context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enter the pkt-too-big context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Adminstrative state of the generation of ICMPv6 Packet Too Big messages
configure ipsec tunnel-template number icmp6-generation pkt-too-big admin-state keyword
enable
enable, disable
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum interval during which PTB messages can be sent
configure ipsec tunnel-template number icmp6-generation pkt-too-big interval number
1 to 60
10
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Max ICMPv6 messages that can be sent during interval
configure ipsec tunnel-template number icmp6-generation pkt-too-big message-count number
10 to 1000
100
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Ignore any full range traffic selector in TSi
configure ipsec tunnel-template number ignore-default-route boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Maximum size of the IP MTU for the payload packets
configure ipsec tunnel-template number ip-mtu number
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
IPsec transform ID for the tunnel template
configure ipsec tunnel-template number ipsec-transform reference
configure ipsec ipsec-transform number
4
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Aging out time of the learned path MTU
configure ipsec tunnel-template number pmtu-discovery-aging number
This command configures the temporary public and private MTU expiration time. The temporary MTU is used for MTU propagation.
900 to 3600
900
seconds
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
New TCP MSS value on the private side
configure ipsec tunnel-template number private-tcp-mss-adjust number
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable propagation of the path MTU to IPv4 hosts
configure ipsec tunnel-template number propagate-pmtu-v4 boolean
When configured to true, the path MTU is propagated to IPv4 hosts.
When configured to false, the path MTU is not propagated to IPv4 hosts.
true
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Enable propagation of the path MTU to IPv6 hosts
configure ipsec tunnel-template number propagate-pmtu-v6 boolean
When configured to true, the path MTU is propagated to IPv6 hosts.
When configured to false, the path MTU is not propagated to IPv6 hosts.
true
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
New TCP MSS value on the public side
configure ipsec tunnel-template number public-tcp-mss-adjust (number | keyword)
512 to 9000
octets
auto
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Anti-replay window size for the tunnel template
configure ipsec tunnel-template number replay-window number
32 | 64 | 128 | 256 | 512
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR
Reverse route creation method in private service
configure ipsec tunnel-template number sp-reverse-route keyword
none
none, use-security-policy
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-1s, 7750 SR-2s, VSR