IPsec

Table: IPsec (description)
Attribute ID Attribute name Description

1

User-Name

For IKEv1 remote-access tunnel, this represents the xauth username.

For IKEv2 remote-access tunnel, this represents the identity of the peer; the value of User-Name is the received IDi in IKEv2 message.

2

User-Password

For IKEv1 remote-access tunnel, this represents the xauth password.

For IKEv2 remote-access tunnel with pskradius authentication method, this represents the pre-shared-key of the ipsec-gw or ipsec-tunnel:

configure service ies/vprn service-id interface ip-int-name sap sap-id ipsec-gw gw-name pre-shared-key

or

configure service vprn service-id interface ip-int-name sap sap-id ipsec-tunnel tnl-name dynamic-keying pre-shared-key

For IKEv2 remote-access tunnel with authentication method other than psk-radius, this represents the password configured in IPsec radius-authentication-policy:

configure ipsec radius-authentication-policy name password

4

NAS-IP-Address

The identifying IP Address of the NAS requesting the authentication.

The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute nas-ip-addr.

The address is determined by the routing instance through which the RADIUS server can be reached:

"Management" - the active IPv4 address in the Boot Options File (bof address ipv4-address)

"Base" or "VPRN" - the IPv4 address of the system interface (configure router interface system address address)

The address can be overwritten with the configured source-address

(configure aaa radius-server-policy policy-name servers source-address ip-address).

8

Framed-IP- Address

The IPv4 address to be assigned to IKEv1/v2 remote-access tunnel client using configuration payload: INTERNAL_IP4_ADDRESS.

9

Framed-IP-Netmask

The IPv4 netmask to be assigned to IKEv1/v2 remote-access tunnel client using configuration payload: INTERNAL_IP4_NETMASK.

30

Called-Station-Id

The local gateway address of IKEv2 remote-access tunnel. The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute called-station-id.

31

Calling-Station-Id

The peer’s address and port of IKEv2 remote-access tunnel.

The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute calling-station-id.

32

NAS-Identifier

A string (configure system name system-name) identifying the NAS originating the Authentication requests.

The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute nas-identifier.

44

Acct-Session-Id

A unique identifier representing an IKEv2 remote-access tunnel session that is authenticated. Same Acct-Session-Id is included in both access-request and accounting-request.

79

EAP-Message

This attribute encapsulates the received IKEv2 EAP payload in access-request.

80

Message-Authenticator

This attribute is used in EAP authentication and provides message integrity verification.

87

Nas-Port-Id

The public SAP ID of IKEv2 remote-access tunnel. The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute nas-port-id.

88

Framed-Pool

The name of one IPv4 address pool or the name of a primary and secondary IPv4 address pool separated with a one-character configurable delimiter (configure router | service vprn service-id dhcp local-dhcp-server server-name use-pool-from-client delimiter delimiter) that should be used for local address assignment during IKEv2 remote-access tunnel setup. A RADIUS server can include the attribute in an Access-Accept. The value of this attribute overrides the local configured value in the ipsec-gw local-address-assignment ipv4 CLI context of the interface SAP.

97

Framed-IPv6-Prefix

The IPv6 address to be assigned to IKEv2 remote-access tunnel client using IKEv2 configuration payload: INTERNAL_IP6_ADDRESS. The prefix and prefix-length of Framed-IPv6-Prefix are conveyed in the corresponding part of INTERNAL_IP6_ADDRESS.

100

Framed-IPv6-Pool

The name of the IPv6 address pool used for local address assignment during IKEv2 remote-access tunnel setup. The value of this attribute overrides the local configured value in the ipsec-gw>local-address-assignment>ipv6 CLI context of the interface SAP.

26.311.16

MS-MPPE-Send-Key

This attribute along with [26.311.17] MS-MPPE-Recv-Key hold the Master Session Key (MSK) of the EAP authentication. It is expected in access-accept when EAP authentication succeed with specific EAP methods.

26.311.17

MS-MPPE-Recv-Key

This attribute along with [26.311.16] MS-MPPE-Send-Key hold the Master Session Key (MSK) of the EAP authentication. It is expected in access-accept when EAP authentication succeed with specific EAP methods.

26.6527.9

Alc-Primary-Dns

The IPv4 DNS server address to be assigned to an IKEv1/v2 remote-access tunnel client using configuration payload: INTERNAL_IP4_DNS. In case of IKEv2, up to four DNS server addresses can be returned to a client, including Alc-Primary-Dns, Alc-Secondary-Dns, Alc-Ipv6-Primary-Dns and Alc-Ipv6-Secondary-Dns.

26.6527.10

Alc-Secondary-Dns

The IPv4 DNS server address to be assigned to an IKEv2 remote-access tunnel client using IKEv2 configuration payload: INTERNAL_IP4_DNS. Up to four DNS server addresses can be returned to a client, including Alc-Primary-Dns, Alc-Secondary-Dns, Alc-Ipv6-Primary-Dns and Alc-Ipv6-Secondary-Dns.

26.6527.61

Alc-IPsec-Serv-Id

IPsec private service ID, used by IKEv1/v2 remote-access tunnel, referring to the preconfigured VPRN where the IPsec tunnel terminates (configure service vprn service-id). A default private service is used when this attribute is omitted (configure service vprn interface sap ipsec-gw default-secure-service). If the returned service ID does not exist/out-of limits or exists but not a VPRN service, the tunnel setup fails.

26.6527.62

Alc-IPsec-Interface

Private IPsec interface name, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured private ipsec interface the IPsec tunnel terminates (config>service>vprn>interface ip-int-name tunnel). A default private interface is used when this attribute is omitted (config>service>ies/vprn>if>sap>ipsec-gw>default-secure-service service-id interface ip-int-name); the maximum length is 32 bytes; if the returned interface does not exist or exceeds the maximum length or exists but is not a private ipsec interface, the tunnel setup fails.

26.6527.63

Alc-IPsec-Tunnel-Template-Id

IPsec tunnel-template ID, used by IKEv1/v2 remote-access tunnel, refers to a preconfigured ipsec tunnel-template (configure ipsec tunnel-template ipsec template identifier). A default tunnel-template is used when this attribute is omitted (config>service>vprn>if>sap>ipsec-gw>default-tunnel-template template-id). If the returned template does not exist or exceeds the limits, the tunnel setup fails.

26.6527.64

Alc-IPsec-SA-Lifetime

IPsec phase2 SA lifetime in seconds, used by IKEv1/v2 remote-access tunnel. A preconfigured value is used when this attribute is omitted (configure ipsec ike-policy policy-id ipsec-lifetime ipsec-lifetime). Values outside the Limits are treated as a tunnel setup failure.

26.6527.65

Alc-IPsec-SA-PFS-Group

IPsec PFS group ID, used by IKEv1/v2 remote-access tunnel. The PFS group in ike-policy is used when this attribute is omitted (configure ipsec ike-policy policy-id pfs dh-group grp-id); if the returned value is not one of the allowed values, the tunnel setup fails.

26.6527.66

Alc-IPsec-SA-Encr-Algorithm

IPsec phase2 SA Encryption Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-encryption-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform transform-id esp-encryption-algorithm algo). This attribute must be used along with Alc-IPsec-SA-Auth-Algorithm, otherwise tunnel setup fails. Values different then the Limits are treated as a setup failure.

26.6527.67

Alc-IPsec-SA-Auth-Algorithm

IPsec phase2 SA Authentication Algorithm, used by IKEv1/v2 remote-access tunnel. The esp-auth-algorithm in ipsec-transform is used when this attribute is omitted (configure ipsec ipsec-transform transform-id esp-auth-algorithm algo). Values different than the Limits are treated as a tunnel setup failure. This attribute must be used along with Alc-IPsec-SA-Encr-Algorithm, otherwise tunnel setup fails.

26.6527.68

Alc-IPsec-SA-Replay-Window

IPsec anti-replay window size, used by IKEv1/v2 remote-access tunnel. The replay-window size in tunnel-template is used when this attribute is omitted (configure ipsec tunnel-template ipsec template identifier replay-window size). Values different than the Limits are treated as a tunnel setup failure.

26.6527.105

Alc-Ipv6- Primary-Dns

The IPv6 DNS server address to be assigned to an IKEv2 remote-access tunnel client using IKEv2 configuration payload: INTERNAL_IP6_DNS. Up to four DNS server addresses can be returned to a client, which could be any combination of Alc-Primary-Dns, Alc-Secondary-Dns, Alc-Ipv6-Primary-Dns and Alc-Ipv6-Secondary-Dns.

26.6527.106

Alc-Ipv6- Secondary-Dns

The IPv6 DNS server address to be assigned to an IKEv2 remote-access tunnel client using IKEv2 configuration payload: INTERNAL_IP6_DNS. Up to four DNS server addresses can be returned to a client, which could be any combination of Alc-Primary-Dns, Alc-Secondary-Dns, Alc-Ipv6-Primary-Dns and Alc-Ipv6-Secondary-Dns.

26.6527.229

Alc-IPsec-Ts-Override

The name of the ts-list to be used during IKEv2 tunnel setup. It overrides the CLI configured value using the CLI command ts-negotiation.

26.6527.237

Alc-Subject-Key-Identifier

The binary value of Subject Key Id in peer's certificate.

The attribute can be included or excluded with configure ipsec radius-authentication-policy name include-radius-attribute client-cert-subject-key-id.

241.26.6527.50

Alc-IPsec-LAA-IPv4-Svr-Name

The local DHCPv4 server name that is used for IKEv2 remote-access tunnel local address assignment; The local-dhcp4-svr-name in address-source config is used when this attribute is omitted (configure service ies|vprn service-id interface ip-int-name sap sap-id ipsec-gw name local-address-assignment ipv4 address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool <[32 chars max]>])

241.26.6527.51

Alc-IPsec-LAA-IPv6-Svr-Name

The local DHCPv6 server name that is used for IKEv2 remote-access tunnel local address assignment; The local-dhcp6-svr-name in address-source config is used when this attribute is omitted (configure service ies|vprn service-id interface ip-int-name sap sap-id ipsec-gw name local-address-assignment ipv6 address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool [secondary-pool <[32 chars max]>])

241.26.6527.52

Alc-IPsec-LAA-IPv4-Svc-Name

The service name where local DHCPv4 server that is used for IKEv2 remote-access tunnel local address assignment resides in; The router-instance in address-source config is used when this attribute is omitted (configure service ies|vprn service-id interface ip-int-name sap sap-id ipsec-gw name local-address-assignment ipv4 address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool [secondary-pool <[32 chars max]>])

241.26.6527.53

Alc-IPsec-LAA-IPv6-Svc-Name

The service name where local DHCPv6 server that is used for IKEv2 remote-access tunnel local address assignment resides in; The router-instance in address-source config is used when this attribute is omitted (configure service ies|vprn service-id interface ip-int-name sap sap-id ipsec-gw name local-address-assignment ipv6 address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp6-server-pool [secondary-pool <[32 chars max]>])

Table: IPsec (limits)
Attribute ID Attribute name Type Limits SR OS format

1

User-Name

string

253 bytes

Format depends on IDi format.

For example:

User-Name = ‟user1@domain1.com”

2

User-Password

string

64 bytes

4

NAS-IP-Address

ipaddr

4 bytes

For example:

NAS-IP-Address=192.0.2.1

8

Framed-IP-Address

ipaddr

4 bytes

For example:

Framed-IP-Address = 192.168.10.100

9

Framed-IP-Netmask

ipaddr

4 bytes

For example:

Framed-IP-Netmask = 255.255.255.0

30

Called-Station-Id

string

253 bytes

local gateway address of IKEv2 remote-access tunnel.

For example:

Called-Station-Id = ‟172.16.100.1”

31

Calling-Station-Id

string

253 bytes

peer-address:port

For example:

Calling-Station-Id = ‟192.168.5.100:500”

32

NAS-Identifier

string

64 char

For example:

NAS-Identifier = "pe1"

44

Acct-Session-Id

string

147 bytes

local_gw_ip-remote_ip:remote_port-time_stamp

For example:

Acct-Session-Id = 172.16.100.1-192.168.5.100:500-1365016423

79

EAP-Message

string

253 bytes

Binary string

80

Message-Authenticator

string

16 bytes

Binary string

87

Nas-Port-Id

string

44 bytes

SAP-ID

For example:

Nas-Port-Id = ‟tunnel-1.public:100”

88

Framed-Pool

string

32 chars per pool name

For example:

Framed-Pool = "MyPoolname"

97

Framed-IPv6-Prefix

ipv6prefix

max. 16 bytes for prefix + 1 byte for length

For example:

Framed-IPv6-Prefix =

2001:DB8:CAFE:1::100/128

100

Framed-IPv6-Pool

string

32 chars

For example:

Framed-IPv6-Pool = "MyV6Poolname"

26.311.16

MS-MPPE-Send-Key

string

254 bytes

Binary string

26.311.17

MS-MPPE-Recv-Key

string

254 bytes

Binary string

26.6527.9

Alc-Primary-Dns

ipaddr

Up to 4 attributes (4B per attribute)

For example:

Alc-Primary-Dns = 192.168.1.1

26.6527.10

Alc-Secondary-Dns

ipaddr

Up to 4 attributes (4B per attribute)

For example:

Alc-Secondary-Dns = 192.168.2.1

26.6527.61

Alc-IPsec-Serv-Id

integer

2147483647 ID

For example:

Alc-IPsec-Serv-Id = 100

26.6527.62

Alc-IPsec-Interface

string

32 chars

For example:

Alc-IPsec-Interface = IPsec-Priv

26.6527.63

Alc-IPsec-Tunnel-Template-Id

integer

1 to 2048

For example:

Alc-IPsec-Tunnel-Template-Id = 200

26.6527.64

Alc-IPsec-SA-Lifetime

integer

[1200 to 172800] seconds

For example:

Alc-IPsec-SA-Lifetime = 2400

26.6527.65

Alc-IPsec-SA-PFS-Group

integer

[1 | 2 | 5 | 14 | 15 | 19 | 20 | 21]

1=group1, 2=group2, 5=group5, and so on

For example:

Alc-IPsec-SA-PFS-Group = 2

26.6527.66

Alc-IPsec-SA-Encr-Algorithm

integer

[1 to 18]

1=null, 2=des, 3=3des, 4=aes128, 5=aes192, 6=aes256, 7=aes128gcm8, 8=aes128gcm12, 9=aes128gcm16, 10=aes192gcm8, 11=aes192gcm12, 12=aes192gcm16, 13=aes256gcm8, 14=aes256gcm12, 15=aes256gcm16, 16=aes128gmac, 17=aes192gmac, 18=aes256gmac

For example:

Alc-IPsec-SA-Encr-Algorithm = 3

26.6527.67

Alc-IPsec-SA-Auth-Algorithm

integer

[1 to 8]

1=null, 2=md5, 3=sha1, 4=sha256, 5=sha384, 6=sha512, 7=aesXcbc, 8=authencrypt

For example:

Alc-IPsec-SA-Auth-Algorithm = 3

26.6527.68

Alc-IPsec-SA-Replay-Window

integer

32|64|128|256|512

For example:

Alc-IPsec-SA-Replay-Window = 128

26.6527.105

Alc-Ipv6- Primary-Dns

ipv6addr

Up to 4 attributes (16B per attribute)

For example:

Alc-Ipv6-Primary-Dns = 2001:DB8:1::1

26.6527.106

Alc-Ipv6- Secondary-Dns

ipv6addr

Up to 4 attributes (16B per attribute)

For example:

Alc-Ipv6-Secondary-Dns = 2001:DB8:2::1

26.6527.229

Alc-IPsec-Ts-Override

string

32 bytes

For example:

Alc-IPsec-Ts-Override="ikev2-ts-list-1"

26.6527.237

Alc-Subject-Key-Identifier

integer64

8 bytes

The least significant 247 bytes of the Subject Key Id in peer's certificate.

241.26.6527.50

Alc-IPsec-LAA-IPv4-Svr-Name

string

32 bytes

For example:

Alc-IPsec-LAA-IPv4-Svr-Name = "dhcpv4-svr-1"

241.26.6527.51

Alc-IPsec-LAA-IPv6-Svr-Name

string

32 bytes

For example:

Alc-IPsec-LAA-IPv6-Svr-Name = "dhcpv6-svr-1"

241.26.6527.52

Alc-IPsec-LAA-IPv4-Svc-Name

string

32 bytes

For example:

Alc-IPsec-LAA-IPv4-Svc-Name = "svc-1"

241.26.6527.53

Alc-IPsec-LAA-IPv6-Svc-Name

string

32 bytes

For example:

Alc-IPsec-LAA-IPv6-Svc-Name = "svc-2"

Table: IPsec (applicability)
Attribute ID Attribute name Access Request Access Accept Access challenge

1

User-Name

1

0-1

0

2

User-Password

1

0

0

4

NAS-IP-Address

0-1

0

0

8

Framed-IP- Address

0

1

0

9

Framed-IP-Netmask

0

0-1

0

30

Called-Station-Id

0-1

0

0

31

Calling-Station-Id

0-1

0

0

32

NAS-Identifier

0-1

0

0

44

Acct-Session-Id

1

0

0

79

EAP-Message

0+

0+

0+

80

Message-Authenticator

0-1

0-1

0-1

87

Nas-Port-Id

0-1

0

0

88

Framed-Pool

0

0-1

0

97

Framed-IPv6-Prefix

0

0-1

0

100

Framed-IPv6-Pool

0

0-1

0

26.311.16

MS-MPPE-Send-Key

0

0-1

0

26.311.17

MS-MPPE-Recv-Key

0

0-1

0

26.6527.9

Alc-Primary-Dns

0

0+

0

26.6527.10

Alc-Secondary-Dns

0

0+

0

26.6527.61

Alc-IPsec-Serv-Id

0

0-1

0

26.6527.62

Alc-IPsec-Interface

0

0-1

0

26.6527.63

Alc-IPsec-Tunnel-Template-Id

0

0-1

0

26.6527.64

Alc-IPsec-SA-Lifetime

0

0-1

0

26.6527.65

Alc-IPsec-SA-PFS-Group

0

0-1

0

26.6527.66

Alc-IPsec-SA-Encr-Algorithm

0

0-1

0

26.6527.67

Alc-IPsec-SA-Auth-Algorithm

0

0-1

0

26.6527.68

Alc-IPsec-SA-Replay-Window

0

0-1

0

26.6527.105

Alc-Ipv6- Primary-Dns

0

0+

0

26.6527.106

Alc-Ipv6- Secondary-Dns

0

0+

0

26.6527.229

Alc-IPsec-Ts-Override

0

0-1

0

26.6527.237

Alc-Subject-Key-Identifier

0-1

0

0

241.26.6527.50

Alc-IPsec-LAA-IPv4-Svr-Name

0

0-1

0

241.26.6527.51

Alc-IPsec-LAA-IPv6-Svr-Name

0

0-1

0

241.26.6527.52

Alc-IPsec-LAA-IPv4-Svc-Name

0

0-1

0

241.26.6527.53

Alc-IPsec-LAA-IPv6-Svc-Name

0

0-1

0