proposal (Security IKE)
Syntax
proposal proposal-name { authentication-algorithm (md5 | sha-256 | sha-384| sha1 | sha-512); authentication-method (certificates | digital-signature | dsa-signatures | ecdsa-signatures-256 | ecdsa-signatures-384 | ecdsa-signatures-521 | pre-shared-keys | rsa-signatures | ecdsa-signatures-521); description description; dh-group (group1 | group14 | group19 | group2 | group20 | group24 | group5 | group15 | group16 | group21); encryption-algorithm (3des-cbc | aes-128-cbc | aes-128-gcm | aes-192-cbc | aes-256-cbc | aes-256-gcm | chacha20-poly1305 | des-cbc); lifetime-seconds seconds; Signature Hash Algorithm (Security IKE) (sha1 | sha256 | sha384 | sha512); }
Hierarchy Level
[edit security ike]
Description
Define an IKE proposal.
Options
proposal-name |
Name of the IKE proposal. The proposal name can be up to 32 alphanumeric characters long. |
authentication-algorithm |
Configure the Internet Key Exchange (IKE) authentication hash algorithm that authenticates packet data. It can be one of the following algorithms:
The device deletes existing IPsec SAs when you update the
|
authentication-method |
Specify the method the device uses to authenticate the source of Internet
Key Exchange (IKE) messages. The
|
description description |
Text the description of IKE proposal. |
dh-group |
Specify the IKE Diffie-Hellman group. |
encryption-algorithm |
Configure an encryption algorithm for an IKE proposal. |
lifetime-seconds seconds |
Specify the lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA and security parameter index (SPI) or terminated.
|
signature-hash-algorithm |
(Optional) Specify the digital signature hash algorithms for IKEv2. Note that you cannot use the option with IKEv1. |
Required Privilege Level
security—To view this statement in the configuration.
security-control—To add this statement to the configuration.
Release Information
Statement modified in Junos OS Release 8.5.
Support for dh-group group 14
and dsa-signatures
added in Junos OS Release 11.1.
Support for sha-384
, ecdsa-signatures-256
,
ecdsa-signatures-384
, group19
,
group20
, and group24
options added in Junos OS
Release 12.1X45-D10.
Support for ecdsa-signatures-256
and
ecdsa-signatures-384
options added in Junos OS Release
12.1X45-D10.
Support for sha-512
, group15
,
group16
, group21
, and
ecdsa-signatures-521
options added in Junos OS Release 19.1R1
on SRX5000 line of devices with junos-ike
package installed.
Support for authentication algorithm (SH1: hmac-sha1-96) added to vSRX Virtual Firewall in Junos OS Release 19.3R1 for Power Mode IPSec mode, along with the existing support in normal mode.
Support for group15
, group16
, and
group21
options added in Junos OS Release 20.3R1 on vSRX
Virtual Firewall instances with junos-ike
package installed.
Support for group15
, group16
, and
group21
options added in Junos OS Release 21.1R1 on vSRX
Virtual Firewall 3.0 instances with junos-ike
package
installed.
Support for certificates
option added in Junos OS Release 22.4R1 on
MX240, MX480, and MX960 in USF mode, SRX1500, SRX4200, SRX4600, SRX5400, SRX5600,
SRX5800, and vSRX 3.0 running the iked process.
Support for the chacha20-poly1305
option added to SRX1600, SRX2300,
SRX4300, SRX4600, SRX5400, SRX5600, SRX5800, and vSRX 3.0 in Junos OS Release
24.2R1.
Support for the digital-signature
and
signature-hash-algorithm
options added in Junos OS Release
24.4R1.