[edit]
user@host# set groups node0 security ike traceoptions file ikelog
user@host# set groups node0 security ike traceoptions file size 100m
user@host# set groups node0 security ike traceoptions flag all
user@host# set groups node0 security ike traceoptions level 15
user@host# set groups node0 security pki traceoptions file pkilog
user@host# set groups node0 security pki traceoptions file size 100m
user@host# set groups node0 security pki traceoptions flag all
user@host# set groups node0 security ike proposal IKE_PROP_PKI
authentication-method
rsa-signatures
user@host# set groups node0 security ike proposal IKE_PROP_PKI dh-group group20
user@host# set groups node0 security ike proposal IKE_PROP_PKI authentication-algorithm
sha-256
user@host# set groups node0 security ike proposal IKE_PROP_PKI encryption-algorithm
aes-256-cbc
user@host# set groups node0 security ike policy IKE_POL_PKI mode main
user@host# set groups node0 security ike policy IKE_POL_PKI proposals IKE_PROP_PKI
user@host# set groups node0 security ike policy IKE_POL_PKI certificate
local-certificate pkicert
user@host# set groups node0 security ike gateway S2S_GW ike-policy IKE_POL_PKI
user@host# set groups node0 security ike gateway S2S_GW version v2-only
user@host# set groups node0 security ipsec proposal IPSEC_PROP_PKI protocol esp
user@host# set groups node0 security ipsec proposal IPSEC_PROP_PKI
authenticationalgorithm
hmac-sha1-96
user@host# set groups node0 security ipsec proposal IPSEC_PROP_PKI
encryptionalgorithm
aes-128-cbc
user@host# set groups node0 security ipsec proposal IPSEC_PROP_PKI lifetime-seconds
200
user@host# set groups node0 security ipsec policy IPSEC_POL_PKI perfect-forwardsecrecy
keys
group20
user@host# set groups node0 security ipsec policy IPSEC_POL_PKI proposals
IPSEC_PROP_PKI
user@host# set groups node0 security ipsec vpn S2S_VPN ha-link-encryption
user@host# set groups node0 security ipsec vpn S2S_VPN ike gateway S2S_GW
user@host# set groups node0 security ipsec vpn S2S_VPN ike ipsec-policy
IPSEC_POL_PKI
user@host# set groups node0 security pki ca-profile S2S_PKI ca-identity S2S_PKI_CA1
user@host# set groups node0 security pki ca-profile S2S_PKI enrollment url
<Enrollment URL of
certificate authority>
user@host# set groups node0 security pki ca-profile S2S_PKI revocation-check crl url
<CRL
distribution point for certificate authority>
user@host# set groups node0 security pki ca-profile S2S_PKI revocation-check
disable
user@host# set groups node0 interfaces st0 unit 0 family inet
user@host# set groups node1 security ike traceoptions file ikelog
user@host# set groups node1 security ike traceoptions file size 100m
user@host# set groups node1 security ike traceoptions flag all
user@host# set groups node1 security ike traceoptions level 15
user@host# set groups node1 security pki traceoptions file pkilog
user@host# set groups node1 security pki traceoptions file size 100m
user@host# set groups node1 security pki traceoptions flag all
user@host# set groups node1 security ike proposal IKE_PROP_PKI
authentication-method
rsa-signatures
user@host# set groups node1 security ike proposal IKE_PROP_PKI dh-group group20
user@host# set groups node1 security ike proposal IKE_PROP_PKI authentication-algorithm
sha-256
user@host# set groups node1 security ike proposal IKE_PROP_PKI encryption-algorithm
aes-256-cbc
user@host# set groups node1 security ike policy IKE_POL_PKI mode main
user@host# set groups node1 security ike policy IKE_POL_PKI proposals IKE_PROP_PKI
user@host# set groups node1 security ike policy IKE_POL_PKI certificate
local-certificate pkicert
user@host# set groups node1 security ike gateway S2S_GW ike-policy IKE_POL_PKI
user@host# set groups node1 security ike gateway S2S_GW version v2-only
user@host# set groups node1 security ipsec proposal IPSEC_PROP_PKI protocol esp
user@host#set groups node1 security ipsec proposal IPSEC_PROP_PKI
authenticationalgorithm
hmac-sha1-96
user@host> set groups node1 security ipsec proposal IPSEC_PROP_PKI
encryptionalgorithm
aes-128-cbc
user@host# set groups node1 security ipsec proposal IPSEC_PROP_PKI lifetime-seconds
200
user@host# set groups node1 security ipsec policy IPSEC_POL_PKI perfect-forward-secrecy
keys
group20
user@host# set groups node1 security ipsec policy IPSEC_POL_PKI proposals
IPSEC_PROP_PKI
user@host# set groups node1 security ipsec vpn S2S_VPN ha-link-encryption
user@host# set groups node1 security ipsec vpn S2S_VPN ike gateway S2S_GW
user@host# set groups node1 security ipsec vpn S2S_VPN ike ipsec-policy
IPSEC_POL_PKI
user@host# set groups node1 security pki ca-profile S2S_PKI ca-identity S2S_PKI_CA1
user@host# set groups node1 security pki ca-profile S2S_PKI enrollment url
<Enrollment URL of
certificate authority>
user@host# set groups node1 security pki ca-profile S2S_PKI revocation-check crl url
<CRL
distribution point for certificate authority>
user@host# set groups node1 security pki ca-profile S2S_PKI revocation-check
disable
user@host# set groups node1 interfaces st0 unit 0 family inet
user@host# set groups global interfaces fab0 fabric-options member-interfaces
ge-0/0/3
user@host# set groups global interfaces fab1 fabric-options member-interfaces
ge-5/0/3
user@host# commit
user@host> clear security pki node-local local-certificate all
user@host> clear security pki node-local certificate-request all
user@host> clear security pki node-local key-pair all
user@host> clear security pki crl all
user@host> clear security pki ca-certificate all
user@host> request security pki node-local generate-key-pair certificate-id pkicert
type rsa size
2048
content_copy zoom_out_map
root@vm# curl "http://PKI-Server-IP/certsrv/certnew.cer?
ReqID=CACert=0=bin" -o /tmp/aux_ca.cer
root@vm# scp /tmp/aux_ca.cer root@node1-host-name:/var/tmp