Dynamic SAs require IKE configuration. With dynamic SAs, you configure IKE first, and then the SA. IKE creates the dynamic SAs and negotiates them for IPsec. The IKE configuration defines the algorithms and keys used to establish the secure IKE connection with the peer security gateway.
You can configure one or more IKE proposals. Each proposal is a list of IKE attributes to protect the IKE connection between the IKE host and its peer.
To configure an IKE proposal, include the proposal statement and specify a name at the [edit services ipsec-vpn ike] hierarchy level:
- [edit services ipsec-vpn ike]
- proposal proposal-name {
- authentication-algorithm (md5 | sha1 | sha-256);
- authentication-method (dsa-signatures | pre-shared-key | rsa-signatures);
- dh-group (group1 | group2);
- encryption-algorithm algorithm;
- lifetime-seconds seconds;
- }
This section includes the following topics:
To configure the authentication algorithm for an IKE proposal, include the authentication-algorithm statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
- [edit services ipsec-vpn ike proposal proposal-name]
- authentication-algorithm (md5 | sha1 | sha-256);
The authentication algorithm can be one of the following:
![]() |
Note: For reference information on Secure Hash Algorithms (SHAs), see Internet draft draft-eastlake-sha2-02.txt, Secure Hash Algorithms (SHA and HMAC-SHA) (expires July 2006). |
To configure the authentication method for an IKE proposal, include the authentication-method statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
- [edit services ipsec-vpn ike proposal proposal-name]
- authentication-method (dsa-signatures | pre-shared-keys
| rsa-signatures);
The authentication method can be one of the following:
Diffie-Hellman is a public-key cryptography scheme that allows two parties to establish a shared secret over an insecure communications channel. It is also used within IKE to establish session keys.
To configure the Diffie-Hellman group for an IKE proposal, include the dh-group statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
The group can be one of the following:
group2 provides more security but requires more processing time.
To configure the encryption algorithm for an IKE proposal, include the encryption-algorithm statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
- [edit services ipsec-vpn ike proposal proposal-name]
- encryption-algorithm algorithm;
The encryption algorithm can be one of the following:
![]() |
Note: For a list of Data Encryption Standard (DES) encryption algorithm weak and semiweak keys, see RFC 2409, The Internet Key Exchange (IKE). The AES encryption algorithms use a software implementation that has much lower throughput, so DES remains the recommended option. For 3des-cbc, the first 8 bytes should differ from the second 8 bytes, and the second 8 bytes should be the same as the third 8 bytes. If you configure an authentication proposal but do not include the encryption statement, the result is NULL encryption. Certain applications expect this result. If you configure no specific authentication or encryption values, the JUNOS software uses the default values of sha1 for the authentication and 3des-cbc for the encryption. |
The lifetime-seconds statement sets the lifetime of an IKE SA. When the IKE SA expires, it is replaced by a new SA (and SPI) or the IPsec connection is terminated.
To configure the lifetime for an IKE SA, include the lifetime-seconds statement at the [edit services ipsec-vpn ike proposal proposal-name] hierarchy level:
- [edit services ipsec-vpn ike proposal proposal-name]
- lifetime-seconds seconds;
By default, the IKE SA lifetime is 3600 seconds. The range is from 180 through 86,400 seconds.
![]() |
Note: For IKE proposals, there is only one SA lifetime value, specified by the JUNOS software. IPsec proposals use a different mechanism; for more information, see Configuring IPsec Proposals. |
Configure an IKE proposal:
- [edit services ipsec-vpn ike]
- proposal ike-proposal {
- authentication-method pre-shared-keys;
- dh-group group1;
- authentication-algorithm sha1;
- encryption-algorithm 3des-cbc;
- }