IP Security - Virtual Private Network
Left running head: 
Chapter name (automatic)
876
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
Alcatel-Lucent
IPSEC TUNNEL INTERFACE CONFIGURATION COMMANDS
This section details the commands used in configuring the IPsec tunnel interface.
T
O CONFIGURE IPSEC PROFILE
IPsec Profile entries created for the IPsec tunnel interface pull together various 
parts used to set up IPsec security associations that include:
• Where the IPsec-protected traffic should be sent (remote IPsec peer).
• What kind of IPsec security should be applied to this traffic (as configured by the 
transform-set)
• Security associations established via IKE.
Note: Force - This option is used to modify a IPsec profile when it is applied to an interface. 
E
XAMPLE
ALU(config)# crypto ipsec profile PF1
ALU(ipsec-profile-PF1)#
T
O ATTACH AN IKE POLICY TO AN IPSEC PROFILE
Note: If no IKE policy is attached to an IPsec profile, ‘default’ IKE policy is used.
E
XAMPLE
ALU(ipsec-profile-PF1)# ike-policy IKE1
ALU(ipsec-profile-PF1)# no ike-policy
Command (in CM) Description
crypto ipsec profile <name> 
[force]
This command is used to configure 
an IPsec Profile.
Command (in IPsec Profile CM) Description
ike-policy <name> This command is used to attach an already 
configured IKE policy to an IPsec profile.
no ike-policy The ‘no’ command detaches the specified 
IKE policy attached to the profile.
Note: An IKE policy must be first 
detached from the profile to 
delete it globally.