ike (Security IPsec VPN)
Syntax
ike { anti-replay-window-size anti-replay-window-size; gateway gateway-name; idle-time seconds; install-interval seconds; ipsec-policy ipsec-policy-name; no-anti-replay; proxy-identity { local ip-prefix; remote ip-prefix; service (any | service-name); } }
Hierarchy Level
[edit security ipsec vpn vpn-name]
Description
Define an IKE-keyed IPsec VPN.
Options
anti-replay-window-size | To enable the
|
gateway-name | Name of the remote IKE gateway. |
idle-time | Specify the maximum amount of idle time to delete a security association (SA) when there is no traffic flow.
|
install-interval | Specify the maximum number of seconds to allow the installation of a rekeyed outbound security association (SA) on the device.
|
ipsec-policy | Specify the IPsec policy name. |
no-anti-replay | Disable the antireplay checking feature of IPsec. Antireplay is an IPsec feature that can detect when a packet is intercepted and then replayed by attackers. By default, antireplay checking is enabled. |
proxy-identity | Optionally specify the IPsec proxy ID to use in negotiations. The default is the identity based on the IKE gateway. If the IKE gateway is an IPv6 site-to-site gateway, the default proxy ID is ::/0. If the IKE gateway is an IPv4 gateway or a dynamic endpoint or dialup gateway, the default proxy ID is 0.0.0.0/0.
|
The remaining statements are explained separately. See CLI Explorer.
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement introduced in Junos OS Release 8.5. Support.
Statement anti-replay-window-size
is introduced in Junos OS Release
19.2R1.
Support for idle-time
and install-interval
options
with IPsec VPN running iked process is added in Junos OS Release 23.4R1.