Enter the ipsec context
Commands in this context configure Internet Protocol Security (IPsec) commands.
16.0.R4
All
Enter the cert-profile list instance
configure ipsec cert-profile string
Commands in this context configure the certificate profile.
10200
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Certificate profile name
configure ipsec cert-profile string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Administrative state of the certificate profile
configure ipsec cert-profile string admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the entry list instance
configure ipsec cert-profile string entry number
Commands in this context configure the certificate profile entry.
8
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Certificate profile entry ID
configure ipsec cert-profile string entry number
1 to 8
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
File name of the imported certificate for the entry
configure ipsec cert-profile string entry number cert string
1 to 95
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
File name of the imported key used for authentication
configure ipsec cert-profile string entry number key string
1 to 95
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Signature scheme for the RSA key
configure ipsec cert-profile string entry number rsa-signature keyword
pkcs1
pkcs1, pss
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the send-chain context
configure ipsec cert-profile string entry number send-chain
Commands in this context allow the system to send additional CA certificates to the peer. These additional CA certificates must be in the certificate chain of the certificate specified by the cert command in the same entry.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
CA certificate to send to the peer
configure ipsec cert-profile string entry number send-chain ca-profile reference
configure system security pki ca-profile string
7
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the client-db list instance
1000
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPsec client database name
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Administrative state of the client database
configure ipsec client-db string admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the client list instance
Commands in this context configure the IPsec client entry in the client database.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Client ID
1 to 8000
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Administrative state of the database client
configure ipsec client-db string client number admin-state keyword
disable
enable, disable
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Client name
configure ipsec client-db string client number client-name string
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the credential context
configure ipsec client-db string client number credential
Commands in this context authenticate peers.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Pre-shared key used to authenticate peers
configure ipsec client-db string client number credential pre-shared-key string
1 to 115
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the identification context
configure ipsec client-db string client number identification
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the idi context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any IDi value as a match
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
FQDN used as the match criteria for the IDi
0 to 255
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
FQDN suffix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi fqdn-suffix string
0 to 255
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IPv4 prefix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi ipv4-prefix string
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv4 prefix as a match for the IDi
configure ipsec client-db string client number identification idi ipv4-prefix-any boolean
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IPv6 prefix used as the match criteria for the IDi
configure ipsec client-db string client number identification idi ipv6-prefix string
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv6 prefix as a match for the IDi
configure ipsec client-db string client number identification idi ipv6-prefix-any boolean
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Email address (RFC 822) used as match criteria for IDi
0 to 255
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Email address domain (RFC 822) as IDi match criteria
configure ipsec client-db string client number identification idi rfc822-suffix string
0 to 255
The following elements are part of a mandatory choice: any, fqdn, fqdn-suffix, ipv4-prefix, ipv4-prefix-any, ipv6-prefix, ipv6-prefix-any, rfc822, or rfc822-suffix.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enable the peer-ip-prefix context
configure ipsec client-db string client number identification peer-ip-prefix
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
IP prefix used as the match criteria
configure ipsec client-db string client number identification peer-ip-prefix ip-prefix (ipv4-prefix | ipv6-prefix)
The following elements are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv4 address as a match
configure ipsec client-db string client number identification peer-ip-prefix ipv4-only boolean
The following elements are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Accept any valid IPv6 address as a match
configure ipsec client-db string client number identification peer-ip-prefix ipv6-only boolean
The following elements are part of a mandatory choice: ip-prefix, ipv4-only, or ipv6-only.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Private interface name used for tunnel setup
configure ipsec client-db string client number private-interface string
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Name of the private service used for tunnel setup
configure ipsec client-db string client number private-service-name string
1 to 64
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Traffic selector list used by the tunnel
1 to 32
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Tunnel template ID
configure ipsec client-db string client number tunnel-template number
1 to 2048
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
configure ipsec client-db string description string
1 to 80
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Enter the match-list context
configure ipsec client-db string match-list
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Use IDi type in the IPsec client matching process
configure ipsec client-db string match-list idi boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
![]() | Warning: Modifying this element toggles the admin-state of the parent element automatically for the new value to take effect. |
Use the peer's tunnel IP address in matching process
configure ipsec client-db string match-list peer-ip-prefix boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ike-policy list instance
configure ipsec ike-policy number
Commands in this context configure an Internet Key Exchange (IKE) policy.
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE policy ID
configure ipsec ike-policy number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
configure ipsec ike-policy number description string
1 to 80
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the dpd context
configure ipsec ike-policy number dpd
Commands in this context configure the dead peer detection mechanism.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
DPD interval
configure ipsec ike-policy number dpd interval number
This command specifies the DPD interval.
Because more time is necessary to determine if there is incoming traffic, the actual time needed to bring down the tunnel is larger than the DPD interval multiplied by the value configured for maximum retry attempts.
10 to 300
30
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum number of retries before the tunnel is removed
configure ipsec ike-policy number dpd max-retries number
2 to 5
3
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Initiate DPD request for incoming ESP or IKE packets
configure ipsec ike-policy number dpd reply-only boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE transform instance associated with the IKE policy
configure ipsec ike-policy number ike-transform reference
This command specifies the IKE transform instance associated with the IKE policy. If multiple IDs are specified, the system selects an IKE transform based on the proposal of the peer. If the system is a tunnel initiator, it uses the configured IKE transform to generate the SA payload.
configure ipsec ike-transform number
4
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ike-version-1 context
configure ipsec ike-policy number ike-version-1
Commands in this context configure the IKE version 1 mode of operation that the IKE policy uses.
The following elements are part of a choice: ike-version-1 or ike-version-2.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used with the IKE policy
configure ipsec ike-policy number ike-version-1 auth-method keyword
psk
psk, plain-psk-xauth
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Mode of operation
configure ipsec ike-policy number ike-version-1 ike-mode keyword
main
main, aggressive
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used with policy on its own side
configure ipsec ike-policy number ike-version-1 own-auth-method keyword
symmetric
symmetric
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Send delete notification for IKEv1 phase 1 removal
configure ipsec ike-policy number ike-version-1 ph1-responder-delete-notify boolean
When configured to true, a delete notification is sent to the peer when deleting an IKEv1 phase 1 SA for which it was the responder.
When configured to false, no notification is sent.
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the ike-version-2 context
configure ipsec ike-policy number ike-version-2
Commands in this context configure the IKE version 2 mode of operation that the IKE policy uses.
The following elements are part of a choice: ike-version-1 or ike-version-2.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used with the IKE policy
configure ipsec ike-policy number ike-version-2 auth-method keyword
psk
psk, cert, psk-radius, cert-radius, eap, auto-eap-radius, auto-eap
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used for the remote peer
configure ipsec ike-policy number ike-version-2 auto-eap-method keyword
This command specifies the behavior for the IKEv2 remote-access tunnel when the authentication method uses EAP or potentially another method to authenticate the remote peer.
cert
psk, cert, psk-or-cert
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the ikev2-fragment context
Commands in this context configure IKEv2 protocol level fragmentation (RFC 7383).
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum size of the IKEv2 packet
configure ipsec ike-policy number ike-version-2 ikev2-fragment mtu number
512 to 9000
1500
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Timeout for reassembly of IKEv2 message fragments
configure ipsec ike-policy number ike-version-2 ikev2-fragment reassembly-timeout number
1 to 5
2
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used with IKE policy on own side
configure ipsec ike-policy number ike-version-2 own-auth-method keyword
symmetric
symmetric, psk, cert, eap-only
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Authentication method used on its own side
configure ipsec ike-policy number ike-version-2 own-auto-eap-method keyword
This command specifies the behavior for the IKEv2 remote-access tunnel when the authentication method uses EAP or potentially another method to authenticate the peer.
cert
psk, cert
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Send IDr payload in last IKE authentication response
configure ipsec ike-policy number ike-version-2 send-idr-after-eap-success boolean
When configured to true, the Identification Responder (IDr) payload is added in the last IKE authentication response after an Extensible Authentication Protocol (EAP) Success packet is received.
When configured to false, the IDr payload is not included in the last IKE.
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lifetime of the Phase 2 IKE key
configure ipsec ike-policy number ipsec-lifetime number
1200 to 31536000
3600
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the limit-init-exchange context
Commands in this context limit the number of ongoing IKEv2 initial exchanges per tunnel.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Administrative state of limiting initial IKE exchanges
configure ipsec ike-policy number limit-init-exchange admin-state keyword
enable
enable, disable
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum timeout for in-progress initial IKE exchange
configure ipsec ike-policy number limit-init-exchange reduced-max-exchange-timeout (number | keyword)
This command configures the maximum timeout for the in-progress initial IKE exchange. If a new IKEv2 IKE_SA_INIT request is received when there is an ongoing IKEv2 initial exchange from the same peer, the timeout value of the existing exchange is set to this specified value. If the none option is configured for this command, the timeout value remains unchanged.
2 to 60
2
seconds
none
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the lockout context
configure ipsec ike-policy number lockout
Commands in this context specify the lockout mechanism for the IPsec tunnel. These commands apply only when the system acts as a tunnel responder.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Time a client is blocked for failed authentications
configure ipsec ike-policy number lockout block (number | keyword)
This command configures the time the client is blocked if the number of failed authentications exceeds the configured value within the specified duration.
1 to 1440
10
minutes
infinite
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Time interval for failed attempts threshold
configure ipsec ike-policy number lockout duration number
This command specifies the time interval in which the configured failed authentication count must be exceeded to trigger a lockout.
1 to 60
5
minutes
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum failed authentications allowed in the duration
configure ipsec ike-policy number lockout failed-attempts number
1 to 64
3
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Max number of ports allowed behind the same IP address
configure ipsec ike-policy number lockout max-port-per-ip number
This command configures the maximum number of ports allowed under the same IP address. When the threshold is exceeded and the client is locked out, all ports behind the IP address are blocked.
1 to 32000
16
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Check IKE peer ID during certificate authentication
configure ipsec ike-policy number match-peer-id-to-cert boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the nat-traversal context
configure ipsec ike-policy number nat-traversal
Commands in this context configure the Network Address Translation Traversal (NAT-T) functionality.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable NAT-T in forced mode
configure ipsec ike-policy number nat-traversal force boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Continue sending keepalive packets (no expiry)
configure ipsec ike-policy number nat-traversal force-keep-alive boolean
true
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Keepalive interval for NAT-T
configure ipsec ike-policy number nat-traversal keep-alive-interval number
120 to 600
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the pfs context
configure ipsec ike-policy number pfs
Commands in this context configure perfect forward secrecy on the IPsec tunnel using the policy. PFS provides for a new Diffie-Hellman (DH) key exchange each time the Security Association (SA) key is renegotiated. When the SA key expires, another key is generated (if the SA remains up).
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Diffie-Helman group used to calculate session keys
configure ipsec ike-policy number pfs dh-group keyword
This command specifies which DH group to use for calculating session keys. More bits provide a higher level of security, but require more processing.
group-2
group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the relay-unsolicited-cfg-attribute context
Commands in this context configure attributes returned from the source (such as a RADIUS server) that are returned to the IKEv2 remote-access tunnel client regardless if the client has requested the attribute in the CFG_REQUEST payload.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Return the IPv4 address from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-address boolean
When configured to true, the system returns the IPv4 address from the source (such as a RADIUS server) to the IKEv2 remote-access tunnel client regardless if the client has requested the address in the CFG_REQUEST payload.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Return IPv4 DNS server address from source to client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-dns boolean
When configured to true, the system returns the IPv4 DNS server address from the source (such as a RADIUS server) to the IKEv2 remote-access tunnel client regardless if the client has requested the address in the CFG_REQUEST payload.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Return the IPv4 netmask from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip4-netmask boolean
When configured to true, the system returns the IPv4 netmask from the source (such as a RADIUS server) to the IKEv2 remote-access tunnel client regardless if the client has requested the netmask in the CFG_REQUEST payload.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Return the IPv6 address from the source to the client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip6-address boolean
When configured to true, the system returns the IPv6 address from the source (such as a RADIUS server) to the IKEv2 remote-access tunnel client regardless if the client has requested the address in the CFG_REQUEST payload.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Return IPv6 DNS server address from source to client
configure ipsec ike-policy number relay-unsolicited-cfg-attribute internal-ip6-dns boolean
When configured to true, the system returns the IPv6 DNS server address from the source (such as a RADIUS server) to the IKEv2 remote-access tunnel client regardless if the client has requested the address in the CFG_REQUEST payload.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ike-transform list instance
configure ipsec ike-transform number
4096
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE transform instance ID
configure ipsec ike-transform number
1 to 4096
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Diffie-Helman group used to calculate session keys
configure ipsec ike-transform number dh-group keyword
group-2
group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE authentication algorithm for IKE transform instance
configure ipsec ike-transform number ike-auth-algorithm keyword
sha-1
md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, auth-encryption
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE encryption algorith for the IKE transform instance
configure ipsec ike-transform number ike-encryption-algorithm keyword
aes-128
des, des-3, aes-128, aes-192, aes-256, aes128-gcm8, aes128-gcm16, aes256-gcm8, aes256-gcm16
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
PRF algorithm for the IKE transform instance
configure ipsec ike-transform number ike-prf-algorithm keyword
This command specifies the pseudo-random function algorithm used for IKE security association.
If an encrypted algorithm such as AES-GCM is used for the IKE encryption algorithm, same-as-auth cannot be used for the IKE PRF algorithm.
same-as-auth
md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, same-as-auth
16.0.R6
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Phase 1 lifetime for the IKE transform instance
configure ipsec ike-transform number isakmp-lifetime number
1200 to 31536000
86400
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ipsec-transform list instance
configure ipsec ipsec-transform number
Commands in this context create an IPsec transform policy. IPsec transform policies can be shared. A change to the IPsec transform is allowed at any time. The change does not impact tunnels that have been established until they are renegotiated. If the change is required immediately, the tunnel must be cleared (reset) for force renegotiation.
IPsec transform policy assignments to a tunnel require the tunnel to be shut down.
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPsec transform policy ID
configure ipsec ipsec-transform number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Encapsulating Security Payload (ESP) authentication
configure ipsec ipsec-transform number esp-auth-algorithm keyword
This command specifies the hashing algorithm used for the authentication function. Both ends of a manually configured tunnel must share the same configuration for the IPsec tunnel to enter the operational state.
sha-1
null, md-5, sha-1, sha-256, sha-384, sha-512, aes-xcbc, auth-encryption
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Encryption algorithm for the IPsec transform session
configure ipsec ipsec-transform number esp-encryption-algorithm keyword
This command specifies the encryption algorithm used for the IPsec session. Encryption applies only to ESP configurations. If encryption is not defined, ESP is not used.
Both ends of a manually configured tunnel must share the same encryption algorithm for the IPsec tunnel to enter the operational state.
When AES-GCM or AES-GMAC is configured:
aes-128
null, des, des-3, aes-128, aes-192, aes-256, aes128-gcm8, aes128-gcm12, aes128-gcm16, aes192-gcm8, aes192-gcm12, aes192-gcm16, aes256-gcm8, aes256-gcm12, aes256-gcm16, null-aes128-gmac, null-aes192-gmac, null-aes256-gmac
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable extended sequence numbering support
configure ipsec ipsec-transform number extended-sequence-number boolean
When configured to true, this command enables 64-bit extended sequence numbering support. This numbering is used for high throughput CHILD_SA to avoid frequent re-keying caused by sequence numbering wrap around.
When configured to false, only 32-bit sequence numbering is supported.
false
21.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Phase 2 lifetime for the IPsec transform session
configure ipsec ipsec-transform number ipsec-lifetime number
This command configures the lifetime of the Phase 2 IKE key.
When unconfigured, the value is inherited from the IPsec lifetime configured in the corresponding IKE policy configured for the same IPsec gateway or IPsec tunnel.
1200 to 31536000
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Diffie-Hellman group used for PFS compilation
configure ipsec ipsec-transform number pfs-dh-group keyword
This command specifies the DH group used for Perfect Forward Secrecy (PFS) compilation during CHILD_SA rekeying.
When unconfigured, the value is inherited from the DH group value from the IPsec gateway or IPsec tunnel.
none, group-1, group-2, group-5, group-14, group-15, group-19, group-20, group-21
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ipsec-transport-mode-profile list instance
Commands in this context configure IPsec-specific attributes that allow an IP tunnel (for example, GRE) to be protected by using IPsec transport mode.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPsec transport mode profile name string
This command specifies the name of the IPsec transport mode profile.
1 to 32
This element is part of a list key.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
configure ipsec ipsec-transport-mode-profile string description string
1 to 80
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the key-exchange context
Commands in this context configure the key exchange used each time the Security Association (SA) key is renegotiated.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the dynamic context
Commands in this context configure dynamic keying for the transport mode profile.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Attempt to establish automatic phase 1 exchange
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic auto-establish boolean
false
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the cert context
Commands in this context configure the attributes of the dynamic keying certificate.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Certificate profile name
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic cert cert-profile reference
configure ipsec cert-profile string
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the status-verify context
Commands in this context configure attributes of Certificate Status Verification (CSV).
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Default result for Certificate Status Verification
This command specifies the default certificate revocation status result to use when all configured CSV methods fail to return result.
revoked
revoked, good
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Primary method of CSV to verify the revocation status
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic cert status-verify primary keyword
This command configures primary method of Certificate Status Verification (CSV) that is used to verify the revocation status of the certificate of the peer.
crl
crl, ocsp
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Secondary method used to verify certificate revocation
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic cert status-verify secondary keyword
This command specifies the secondary method of Certificate Status Verification (CSV) that is used to verify the revocation status of the peer certificate.
none
none, crl, ocsp
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Trust anchor profile name
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic cert trust-anchor-profile reference
configure ipsec trust-anchor-profile string
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the id context
Commands in this context specifies the local ID for 7750 SRs used for IDi or IDr for IKEv2 tunnels.
The default behavior depends on the local auth-method as follows:
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
FQDN used as the local ID IKE type
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic id fqdn string
1 to 255
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPv4 as the local ID type
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic id ipv4 string
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPv6 used as the local IKE ID type
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic id ipv6 (ipv4-address-no-zone | ipv6-address-no-zone)
The following elements are part of a choice: fqdn, ipv4, or ipv6.
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IKE policy ID
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic ike-policy reference
This command specifies the ID of the IKE policy used for IKE negotiation.
The ipsec-transport-mode-profile configuration only supports IKEv2.
configure ipsec ike-policy number
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPsec transform IDs used by the dynamic key
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic ipsec-transform reference
This command specifies IPsec transform IDs used for CHILD_SA negotiation.
configure ipsec ipsec-transform number
4
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Pre-shared key for IKE authentication
configure ipsec ipsec-transport-mode-profile string key-exchange dynamic pre-shared-key string
1 to 115
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the max-history-key-records context
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum number of recent records
configure ipsec ipsec-transport-mode-profile string max-history-key-records esp number
1 to 48
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum number of historical IKE key records
configure ipsec ipsec-transport-mode-profile string max-history-key-records ike number
1 to 3
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Anti-replay window size
configure ipsec ipsec-transport-mode-profile string replay-window number
This command specifies the size of an IPsec anti-replay window. If not configured, then IPsec anti-replay is disabled.
32 | 64 | 128 | 256 | 512
packets
21.10.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the radius context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the accounting-policy list instance
configure ipsec radius accounting-policy string
Commands in this context configure RADIUS accounting policies to collect accounting statistics.
100
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
RADIUS accounting policy name
configure ipsec radius accounting-policy string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the include-radius-attribute context
Commands in this context specify the RADIUS attributes that are to be included in the RADIUS Authentication-Request messages.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include accounting attributes in RADIUS packets
configure ipsec radius accounting-policy string include-radius-attribute acct-stats boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Called-Station-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute called-station-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Calling-Station-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute calling-station-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Framed-IP-Address attribute
configure ipsec radius accounting-policy string include-radius-attribute framed-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Framed-IPv6-Prefix attribute
configure ipsec radius accounting-policy string include-radius-attribute framed-ipv6-prefix boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-Identifier attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-identifier boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-IP-Address attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-Port-Id attribute
configure ipsec radius accounting-policy string include-radius-attribute nas-port-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Referenced RADIUS server policy
configure ipsec radius accounting-policy string radius-server-policy reference
configure aaa radius server-policy string
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the update-interval context
Commands in this context determine how RADIUS interim-update packets are sent for IKEv2 remote-access tunnels.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Jitter interval for sending each interim-update packet
configure ipsec radius accounting-policy string update-interval jitter number
This command specifies the jitter interval for the RADIUS interim-update packets.
When unconfigured, the system uses 10% of the update interval value.
0 to 3600
seconds
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Update interval of the RADIUS accounting data
configure ipsec radius accounting-policy string update-interval value number
This command configures the update interval of the RADIUS accounting data. If a value of 0 is configured, no intermediate updates are sent.
0 | 5 to 259200
10
minutes
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the authentication-policy list instance
Commands in this context configure the RADIUS authentication policy associated with the IPsec gateway.
100
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
RADIUS authentication policy name
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the include-radius-attribute context
Commands in this context specify the RADIUS attributes to be included in the RADIUS Authentication-Request messages.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Called-Station-Id attribute
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Calling-Station-Id attribute
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the Subject Key Identifier
When configured to true, the Subject Key Identifier of the certificate of the peer is included in the RADIUS Access-Request packet as VSA: Alc-Subject-Key-Identifier.
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-Identifier attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-identifier boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-IP-Address attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-ip-addr boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Include the NAS-Port-Id attribute
configure ipsec radius authentication-policy string include-radius-attribute nas-port-id boolean
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Password used in RADIUS access requests
configure ipsec radius authentication-policy string password string
1 to 115
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Referenced RADIUS server policy
configure ipsec radius authentication-policy string radius-server-policy reference
configure aaa radius server-policy string
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Show IPsec IKE and ESP keys in the output
configure ipsec show-ipsec-keys boolean
When configured to true, this command allows IPsec keys to be (optionally) included in the display output of certain debug and admin commands.
When configured to false, the key display is disabled.
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the static-sa list instance
1000
16.0.R6
All
Static SA name
1 to 32
This element is part of a list key.
16.0.R6
All
Enable the authentication context
configure ipsec static-sa string authentication
16.0.R6
All
Authentication algorithm used for an IPsec manual SA
configure ipsec static-sa string authentication algorithm keyword
md5, sha1
This element is mandatory.
16.0.R6
All
Key used for the authentication algorithm
configure ipsec static-sa string authentication key string
1 to 54
This element is mandatory.
16.0.R6
All
Text description
configure ipsec static-sa string description string
1 to 32
16.0.R6
All
Direction to which the static SA entry can be applied
bidirectional
inbound, outbound, bidirectional
16.0.R6
All
IPsec protocol used with the static SA
esp
ah, esp
16.0.R6
All
Security Parameter Index (SPI) for the static SA
This command specifies the SPI for the static SA.
When the direction command is set to inbound, the SPI is used to look up the instruction to verify and decrypt the incoming IPsec packets. When the direction command is set to outbound, the SPI is used in the encoding of the outgoing packets. The remote node can use the SPI to look up the instruction to verify and decrypt the packet.
When unconfigured, the static SA cannot be used.
256 to 16383
16.0.R6
All
Enter the trust-anchor-profile list instance
configure ipsec trust-anchor-profile string
10128
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Trust anchor profile name for IPsec tunnel or gateway
configure ipsec trust-anchor-profile string
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Add a list entry for trust-anchor
configure ipsec trust-anchor-profile string trust-anchor reference
Commands in this context configure a CA profile as a trust anchor CA.
8
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Name of the CA profile as a trust anchor profile
configure ipsec trust-anchor-profile string trust-anchor reference
configure system security pki ca-profile string
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the ts-list list instance
Commands in this context configure Traffic Selector (TS) settings.
32768
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Traffic Selector (TS) list name
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the local context
Commands in this context configure a local TS list, a traffic selector, such as TSr, when the system acts as an IKEv2 responder.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the entry list instance
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
TS list entry ID
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the address context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IP prefix for address range in IKEv2 traffic selector
The following elements are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the range context
The following elements are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the IP address range for the entry
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the IP address range
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the protocol context
Commands in this context specify the protocol settings for the IKEv2 traffic selector.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Match any protocol ID
The following elements are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the id context
The following elements are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
Commands in this context configure port range information for the protocol.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp6 context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
Commands in this context configure port range information for the protocol.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp6 port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp6 port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string local entry number protocol id icmp6 port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string local entry number protocol id icmp6 port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the mipv6 context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Protocol ID that accepts any port value
1 to 255
icmp, tcp, udp, icmp6, sctp, mipv6
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the sctp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the tcp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the udp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the remote context
Commands in this context configure a remote TS list, a traffic selector, such as TSr, when the system acts as an IKEv2 responder.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the entry list instance
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
TS list entry ID
1 to 32
This element is part of a list key.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the address context
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IP prefix for address range in IKEv2 traffic selector
The following elements are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the range context
The following elements are part of a mandatory choice: prefix or range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the IP address range for the entry
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the IP address range
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the protocol context
Commands in this context specify the protocol settings for the IKEv2 traffic selector.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Match any protocol ID
The following elements are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the id context
The following elements are part of a mandatory choice: any or id.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
Commands in this context configure port range information for the protocol.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp6 context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
Commands in this context configure port range information for the protocol.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range begin-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range begin-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP code range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range end-icmp-code number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the ICMP type range
configure ipsec ts-list string remote entry number protocol id icmp6 port-range end-icmp-type number
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the mipv6 context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 255
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Protocol ID that accepts any port value
1 to 255
icmp, tcp, udp, icmp6, sctp, mipv6
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the sctp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the tcp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the udp context
The following elements are part of a mandatory choice: icmp, icmp6, mipv6, protocol-id-with-any-port, sctp, tcp, or udp.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Support OPAQUE ports
This command allows the protocol ID to be accepted even when the port information is not available.
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable the port-range context
The following elements are part of a choice: opaque or port-range.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Lower bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Upper bound of the port range
0 to 65535
This element is mandatory.
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the tunnel-template list instance
configure ipsec tunnel-template number
2048
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Tunnel template ID
configure ipsec tunnel-template number
1 to 2048
This element is part of a list key.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Clear the Do-not-Fragment (DF) bit
configure ipsec tunnel-template number clear-df-bit boolean
false
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable traffic class copy upon decapsulation
configure ipsec tunnel-template number copy-traffic-class-upon-decapsulation boolean
When configured to true, the system copies the traffic class from the outer tunnel IP packet header to the payload IP packet header in the decapsulating direction (public to private).
When configured to false, the system does not copy the traffic class from the outer IP packet to the payload IP packet header upon decapsulation.
false
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Text description
configure ipsec tunnel-template number description string
1 to 80
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum size of the encapsulated tunnel packet
configure ipsec tunnel-template number encapsulated-ip-mtu number
This command specifies the maximum size of the encapsulated tunnel packet to the IPsec tunnel, the IP tunnel, or the dynamic tunnels terminated on the IPsec Gateway. If the encapsulated IPv4 or IPv6 tunnel packet exceeds this value, the system fragments the packet.
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp-generation context
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the frag-required context
Commands in this context configure the attributes for sending generated ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) back to the source, if the received size of the IPv4 packet on the private side exceeds the private MTU size.
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Administrative state of sending ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required admin-state keyword
This command sends the ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) back to the source if the received size of the IPv4 packet on the private side exceeds the private MTU size.
enable
enable, disable
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Interval for sending ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required interval number
This command configures the interval for sending ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4). The maximum number of messages that can be sent is configured by the message-count command.
1 to 60
10
seconds
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum number of ICMP messages
configure ipsec tunnel-template number icmp-generation frag-required message-count number
This command configures the maximum number of ICMP Destination Unreachable "fragmentation needed and DF set" messages (type 3, code 4) that can be sent during the period specified by the interval command.
10 to 1000
100
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the icmp6-generation context
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enter the pkt-too-big context
Commands in this context configure values for the ICMPv6 Packet Too Big (PTB) messages. The system sends PTB messages if an IPv6 packet is received on the private side that is larger than 1280 bytes and also exceeds the private MTU of the tunnel.
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Administrative state of Packet Too Big message sends
configure ipsec tunnel-template number icmp6-generation pkt-too-big admin-state keyword
enable
enable, disable
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum interval during which PTB messages can be sent
configure ipsec tunnel-template number icmp6-generation pkt-too-big interval number
1 to 60
10
seconds
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Max ICMPv6 messages that can be sent during interval
configure ipsec tunnel-template number icmp6-generation pkt-too-big message-count number
10 to 1000
100
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Ignore any full range traffic selector in TSi
configure ipsec tunnel-template number ignore-default-route boolean
When configured to true, any full range traffic selector is ignored when creating a reverse route.
When configured to false, no CHILD_SA is created if any full range traffic selector is included in TSi.
false
19.7.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Maximum size of the IP MTU for the payload packets
configure ipsec tunnel-template number ip-mtu number
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
IPsec transform ID for the tunnel template
configure ipsec tunnel-template number ipsec-transform reference
configure ipsec ipsec-transform number
4
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Aging out time of the learned path MTU
configure ipsec tunnel-template number pmtu-discovery-aging number
This command configures the temporary public and private MTU expiration time. The temporary MTU is used for MTU propagation.
900 to 3600
900
seconds
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
New TCP MSS value on the private side
configure ipsec tunnel-template number private-tcp-mss-adjust number
This command specifies the new (adjusted) TCP MSS value of TCP SYN packets on the private side.
When unconfigured, the MSS value is derived from the received TCP SYN packet on the private side.
512 to 9000
octets
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable propagation of the path MTU to IPv4 hosts
configure ipsec tunnel-template number propagate-pmtu-v4 boolean
When configured to true, the path MTU is propagated to IPv4 hosts.
When configured to false, the path MTU is not propagated to IPv4 hosts.
true
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Enable propagation of the path MTU to IPv6 hosts
configure ipsec tunnel-template number propagate-pmtu-v6 boolean
When configured to true, the path MTU is propagated to IPv6 hosts.
When configured to false, the path MTU is not propagated to IPv6 hosts.
true
21.5.R1
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
New TCP MSS value on the public side
configure ipsec tunnel-template number public-tcp-mss-adjust (number | keyword)
This command specifies the new (adjusted) TCP MSS value for the TCP traffic in an IPsec tunnel which is sent from the public network to the private network. The system can use this value to adjust or insert the MSS option in the TCP SYN packet.
When unconfigured, the MSS value is derived from the public MTU and IPsec overhead.
512 to 9000
octets
auto
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Anti-replay window size for the tunnel template
configure ipsec tunnel-template number replay-window number
32 | 64 | 128 | 256 | 512
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR
Reverse route creation method in private service
configure ipsec tunnel-template number sp-reverse-route keyword
This command allows the system to automatically create a reverse route based on dynamic LAN-to-LAN tunnel's TSi in private service.
none
none, use-security-policy
16.0.R4
7450 ESS, 7750 SR, 7750 SR-e, 7750 SR-s, VSR