IP Security - Virtual Private Network
Left running head:
Chapter name (automatic)
876
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
Alcatel-Lucent
IPSEC TUNNEL INTERFACE CONFIGURATION COMMANDS
This section details the commands used in configuring the IPsec tunnel interface.
T
O CONFIGURE IPSEC PROFILE
IPsec Profile entries created for the IPsec tunnel interface pull together various
parts used to set up IPsec security associations that include:
• Where the IPsec-protected traffic should be sent (remote IPsec peer).
• What kind of IPsec security should be applied to this traffic (as configured by the
transform-set)
• Security associations established via IKE.
Note: Force - This option is used to modify a IPsec profile when it is applied to an interface.
E
XAMPLE
ALU(config)# crypto ipsec profile PF1
ALU(ipsec-profile-PF1)#
T
O ATTACH AN IKE POLICY TO AN IPSEC PROFILE
Note: If no IKE policy is attached to an IPsec profile, ‘default’ IKE policy is used.
E
XAMPLE
ALU(ipsec-profile-PF1)# ike-policy IKE1
ALU(ipsec-profile-PF1)# no ike-policy
Command (in CM) Description
crypto ipsec profile <name>
[force]
This command is used to configure
an IPsec Profile.
Command (in IPsec Profile CM) Description
ike-policy <name> This command is used to attach an already
configured IKE policy to an IPsec profile.
no ike-policy The ‘no’ command detaches the specified
IKE policy attached to the profile.
Note: An IKE policy must be first
detached from the profile to
delete it globally.