You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
« Previous
Version 10
Next »
Use this object to configure IPsec Security Policy Database (SPD) for the
Unable to show "metadata-from": No such page "_space_variables"
. If
action
parameter is set to "protect", the SPD establishes the phase 2 criteria for the negotiation between
Unable to show "metadata-from": No such page "_space_variables"
and the IKE peer. The successful completion of this negotiation results in a Security Association (SA).
Note
The
Unable to show "metadata-from": No such page "_space_variables"
does not support IPsec for media interception over UDP.
Command Syntax
% set addressContext <addressContext name> ipsec spd <spd_name>
action <bypass | discard | protect>
localIpAddr <ipAddress>
localIpPrefixLen <0-128>
localPort <0-65535>
mode <transport | tunnel>
precedence <0-65535>
protocol <0-255>
remoteIpAddr <ipAddress>
remoteIpPrefixLen <0-128>
remotePort <0-65535>
state <disabled | enabled>
Command Parameters
Parameter | Length/Range | Description |
---|
spd
| 1-23 | Specifies the name of an IPsec Security Policy Database (SPD) entry. The IPsec SPD is an ordered list of entries ("rules") that specify sets of packets and determine whether or not to permit, deny, or protect packets between the Unable to show "metadata-from": No such page "_space_variables" and the peer that is referenced from the entry. If the packets are to be protected, this entry references information that specifies how to protect them.You can configure up to 4,096 SPD entries. |
action
| N/A | Action applied when packets processed by IPsec found matching the selectors of this SPD rule. discard – Specifies that the packets are dropped.bypass – Specifies that the packets are bypassed as clear text.protect – Specifies that the packets are protected by IPsec based on the protection parameters specified in the configured IPsec protection profile.
|
localIpAddr
| IPv4/IPv6 address | Specifies the local IPv4 or IPv6 address of the SPD traffic selector. Default is 0.0.0.0. |
localIpPrefixLen
| 0-128 | Specifies the local IP prefix length of the SPD traffic selector. Default value is 0. Note: If IPsec Peer protocol is set to “IKEv2” or “ANY”, localIpPrefixLen must be set to "32" for IPv4 and "128" for IPv6 because the Unable to show "metadata-from": No such page "_space_variables" does not support range-based parameters for IKEv2 selectors. |
localPort
| 0-65535 | Specifies the local port of the SPD traffic selector. Zero indicates wildcard. Default value is 0. |
mode | N/A | Set the SPD mode type. transport – Use this mode to encrypt and authenticate the IP payload only. tunnel (default) – Use this mode to encrypt and authenticate the entire IP packet (both header and payload). This encrypted packet is encapsulated in a new packet containing a new IP header.
Note: The transport mode is the recommended mode for LI configuration. Note: This parameter is only applicable when action is set to "protect ". |
precedence
| 0-65535 | A unique precedence (evaluation order) for this SPD. |
protocol
| 0-255 | Specifies the IP protocol number of the SPD traffic selector. This parameter uses IANA protocol number assignment, that is, protocol number 6 represents TCP, protocol number 17 represents UDP. Zero indicates wildcard. Default value is 0. |
remoteIpAddr
| N/A | Specifies the remote IPv4 or IPv6 address of the SPD traffic selector. Default is 0.0.0.0 |
remoteIpPrefixLen
| 0-128 | Specifies the remote IP prefix length of the peer's SPD traffic selector. Zero indicates wildcard. Default value is 0. Note: If IPsec Peer protocol is set to “IKEv2” or “ANY”, remoteIpPrefixLen must be set to "32" for IPv4 and "128" for IPv6 because the Unable to show "metadata-from": No such page "_space_variables" does not support range-based parameters for IKEv2 selectors. |
remotePort
| 0-65535 | Specifies the remote port of the SPD traffic selector. Zero indicates wildcard. Default value is 0. |
state
| N/A | Administrative state of this SPD entry. disabled (default)enabled
|
Command Examples
% set addressContext default ipsec spd SPD3 localIpAddr 10.16.230.2 localIpPrefixLen 32 remoteIpAddr 10.16.220.2 remoteIpPrefixLen 32 action protect protocol 17 state enabled precedence 102
% show addressContext default ipsec
spd SPD3 {
state enabled;
precedence 102;
localIpAddr 10.16.230.2;
localIpPrefixLen 32;
remoteIpAddr 10.16.220.2;
remoteIpPrefixLen 32;
protocol 17;
action protect;
}