EasyManua.ls Logo

Alcatel-Lucent OmniAccess 5740 - Ipsec Tunnel Interface Configuration Commands

Alcatel-Lucent OmniAccess 5740
1225 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
IP Security - Virtual Private Network
Left running head:
Chapter name (automatic)
876
Beta Beta
OmniAccess 5740 Unified Services Gateway CLI Configuration Guide
Alcatel-Lucent
IPSEC TUNNEL INTERFACE CONFIGURATION COMMANDS
This section details the commands used in configuring the IPsec tunnel interface.
T
O CONFIGURE IPSEC PROFILE
IPsec Profile entries created for the IPsec tunnel interface pull together various
parts used to set up IPsec security associations that include:
Where the IPsec-protected traffic should be sent (remote IPsec peer).
What kind of IPsec security should be applied to this traffic (as configured by the
transform-set)
Security associations established via IKE.
Note: Force - This option is used to modify a IPsec profile when it is applied to an interface.
E
XAMPLE
ALU(config)# crypto ipsec profile PF1
ALU(ipsec-profile-PF1)#
T
O ATTACH AN IKE POLICY TO AN IPSEC PROFILE
Note: If no IKE policy is attached to an IPsec profile, ‘default’ IKE policy is used.
E
XAMPLE
ALU(ipsec-profile-PF1)# ike-policy IKE1
ALU(ipsec-profile-PF1)# no ike-policy
Command (in CM) Description
crypto ipsec profile <name>
[force]
This command is used to configure
an IPsec Profile.
Command (in IPsec Profile CM) Description
ike-policy <name> This command is used to attach an already
configured IKE policy to an IPsec profile.
no ike-policy The ‘no’ command detaches the specified
IKE policy attached to the profile.
Note: An IKE policy must be first
detached from the profile to
delete it globally.

Table of Contents

Other manuals for Alcatel-Lucent OmniAccess 5740

Related product manuals