Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Authentication Process

The remote dynamic peer initiates IKE and IPSec negotiations with the local (Juniper Networks) router. The local router uses a default set of authentication and encryption values to match the IPSec and IKE proposals sent by the remote peer to establish the SA. If any of the values match, the tunnel establishment process continues. The default values are shown in Table 1.

Table 1: Default IKE and IPSec Proposals for Dynamic SA Negotiations

Statement Name

Values

Implicit IKE Proposal

authentication-method

preshared keys

dh-group

group1, group2

authentication-algorithm

sha1, md5

encryption-algorithm

3des-cbc, des-cbc

lifetime-seconds

3600 seconds

Implicit IPSec Proposal

protocol

esp, ah, bundle

authentication-algorithm

hmac-sha1-96, hmac-md5-96

encryption-algorithm

3des-cbc, des-cbc

lifetime-seconds

28,800 seconds (8 hours)

Phase 2 of the authentication process matches the proxy identities of the protected hosts and networks sent by the peer against a list of configured proxy identities. The accepted proxy identity is used to create the dynamic rules for encrypting the traffic. You can configure proxy identities by including the allowed-proxy-pair statement in an IKE access profile at the [edit access profile profile-name client * ike] hierarchy level. If no configured entry matches, the negotiation is rejected.

However, if you do not configure the allowed-proxy-pair statement, the default value ANY(0.0.0.0/0)-ANY is applied, and the local router accepts any proxy identities sent by the peer.

Once the phase 2 negotiation has been successfully completed, the router builds dynamic rules and inserts the reverse route into the routing table using the accepted proxy identity.

Published: 2013-07-19

Supported Platforms

Published: 2013-07-19