EasyManua.ls Logo

Juniper ACX2100 - Safety Warnings

Juniper ACX2100
3270 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
IKE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1088
Enabling Inline Services Interface on ACX Series . . . . . . . . . . . . . . . . . . . . . . . . 1089
Understanding Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1090
Configuring Service Sets to Be Applied to Services Interfaces . . . . . . . . . . . . . . 1092
Configuring Services Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1092
Configuring Next-Hop Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093
Determining Traffic Direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1093
Interface-Style Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094
Next-Hop-Style Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094
Configuring IPsec Service Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095
Configuring the Local Gateway Address for IPsec Service Sets . . . . . . . . . 1095
IKE Addresses in VRF Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096
Configuring IKE Access Profiles for IPsec Service Sets . . . . . . . . . . . . . . . . 1096
Configuring or Disabling Antireplay Service . . . . . . . . . . . . . . . . . . . . . . . . . 1097
Configuring IPsec Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098
Configuring the Authentication Algorithm for an IPsec Proposal . . . . . . . . 1098
Configuring the Description for an IPsec Proposal . . . . . . . . . . . . . . . . . . . 1099
Configuring the Encryption Algorithm for an IPsec Proposal . . . . . . . . . . . 1099
Configuring the Lifetime for an IPsec SA . . . . . . . . . . . . . . . . . . . . . . . . . . . 1099
Configuring the Protocol for a Dynamic SA . . . . . . . . . . . . . . . . . . . . . . . . . 1099
Configuring IKE Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1100
Configuring the Authentication Algorithm for an IKE Proposal . . . . . . . . . . 1100
Configuring the Authentication Method for an IKE Proposal . . . . . . . . . . . . 1100
Configuring the Encryption Algorithm for an IKE Proposal . . . . . . . . . . . . . . 1101
Configuring the Lifetime for an IKE SA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101
Example: Configuring an IKE Proposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
Configuring IPsec Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
Configuring the Description for an IPsec Policy . . . . . . . . . . . . . . . . . . . . . . 1103
Configuring Perfect Forward Secrecy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103
Configuring the Proposals in an IPsec Policy . . . . . . . . . . . . . . . . . . . . . . . . 1103
Configuring IKE Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Configuring the Proposals in an IKE Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 1104
Configuring the Preshared Key for an IKE Policy . . . . . . . . . . . . . . . . . . . . . . 1104
Configuring IPsec Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1105
Configuring Match Direction for IPsec Rules . . . . . . . . . . . . . . . . . . . . . . . . . 1106
Configuring Match Conditions in IPsec Rules . . . . . . . . . . . . . . . . . . . . . . . . 1107
Configuring Actions in IPsec Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107
Configuring Destination Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107
Configuring IPsec Rule Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1108
Tracing IPsec Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1108
Chapter 34 Configuring Operations, Administration, and Management (OAM) . . . . . . 1111
Understanding Ethernet OAM Link Fault Management for ACX Series
Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1112
Configuring Ethernet Local Management Interface on ACX Series . . . . . . . . . . . 1113
Ethernet Local Management Interface Overview . . . . . . . . . . . . . . . . . . . . . 1113
Configuring the Ethernet Local Management Interface . . . . . . . . . . . . . . . . . 1115
Configuring an OAM Protocol (CFM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115
Assigning the OAM Protocol to an EVC . . . . . . . . . . . . . . . . . . . . . . . . . . 1115
xxvCopyright © 2017, Juniper Networks, Inc.
Table of Contents

Table of Contents

Other manuals for Juniper ACX2100

Related product manuals