This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.

System Basics: Security Services Configuration Guide
The Junos operating system (Junos OS) supports the IP Security (IPsec) associations and the Internet Key Exchange (IKE) security services features. The IPsec suite provides network layer data security with functions such as authentication of origin, data integrity, confidentiality, replay protection, and nonrepudiation of source. IKE defines mechanisms for key generation and exchange and manages security associations (SAs). An SA is a simplex connection that allows two hosts to communicate with each other securely by means of IPsec. Use the topics in this section to configure essential security services.
|
|
|
|
- Overview
IPsec Overview IPsec Requirements for Junos-FIPS
IPsec Configuration for an ES PIC Overview
Security Associations and IKE Overview Digital Certificates Overview - Configuration
Configuring IPsec for an ES PIC Configuring Minimum Manual Security Associations for IPsec on an ES PIC
Configuring Minimum IKE Requirements for IPsec on an ES PIC
Configuring Minimum Digital Certificate Requirements for IKE on an ES PIC
Configuring Security Associations for IPsec on an ES PIC
Configuring Manual IPsec Security Associations for an ES PIC
Configuring Dynamic IPsec Security Associations
Configuring an IKE Proposal for Dynamic SAs
Example: Configuring an IKE Proposal
Configuring an IKE Policy for Preshared Keys
Example: Configuring an IKE Policy
Configuring an IPsec Proposal for an ES PIC
Configuring the IPsec Policy for an ES PIC
Example: Configuring an IPsec Policy
Configuring Digital Certificates for ES and AS PICs Configuration Statements for Setting Up Digital Certificates for an ES PIC
Obtaining a Certificate from a Certificate Authority for an ES PIC
Requesting a CA Digital Certificate for an ES PIC on an M Series or T Series Router
Example: Requesting a CA Digital Certificate
Generating a Private and Public Key Pair for Digital Certificates for an ES PIC
Obtaining a Signed Certificate from the CA for an ES PIC
Configuring Digital Certificates for an ES PIC
Configuring an IKE Policy for Digital Certificates for an ES PIC
Associating the Configured Security Association with a Logical Interface
Configuring Digital Certificates for Adaptive Services Interfaces
Configuring Traffic Filters and Tracing Operations Example: Configuring an Outbound Traffic Filter
Example: Applying an Outbound Traffic Filter
Example: Configuring an Inbound Traffic Filter for a Policy Check
Example: Applying an Inbound Traffic Filter to an ES PIC for a Policy Check
Configuring Tracing Operations for Security Services
Configuring Tracing Operations for IPsec Events for Adaptive Services PICs
Configuring Authentication Key Updates Configuring the Authentication Key Update Mechanism for BGP and LDP Routing Protocols
Configuring Keys for SSH and SSL Configuration Statements [edit security] Hierarchy Level
algorithm (Authentication Keychain)
authentication (Security IPsec)
authentication-algorithm (Security IKE)
authentication-algorithm (Security IPsec)
crl (Adaptive Services Interface)
description (Authentication Keychain)
direction (Junos-FIPS Software)
encryption (Junos-FIPS Software)
perfect-forward-secrecy (Security)
protocol (Junos-FIPS Software)
re-enroll-trigger-time-percentage
retry (Adaptive Services Interface)
security-association (Junos OS)
security-association (Junos-FIPS Software)
- Administration
IPsec Administrative Commands request security pki ca-certificate enroll
request security pki ca-certificate load
request security pki ca-certificate verify
request security pki generate-certificate-request
request security pki local-certificate generate-self-signed
IPsec Monitoring Commands clear security pki ca-certificate
clear security pki certificate-request
clear security pki local-certificate
clear services ipsec-vpn certificates
clear services ipsec-vpn ipsec statistics
- Troubleshooting
Knowledge Base