For feedback and comments:
documentation.feedback@alcatel-lucent.com

Table of Contents Previous Next PDF


IPSec Configuration Commands
Generic Commands
description
Syntax
description description-string
Context
config>isa>ipsec-group
config>isa
Description
This command creates a text description which is stored in the configuration file to help identify the content of the entity.
The no form of the command removes the string from the configuration.
Default
none
Parameters
string
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
shutdown
Syntax
[no] shutdown
Context
config>isa
config>isa>aa-group
config>isa>tunnel-grp
config>ipsec>cert-profile
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
config>service>ies>if>sap>ipsec-gateway>dhcp
config>service>vprn>if>sap>ipsec-gateway>dhcp
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description
This command administratively disables the entity. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many entities must be explicitly enabled using the no shutdown command.
The shutdown command administratively disables an entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. Many objects must be shut down before they may be deleted.
 
Hardware Commands
mda-type
Syntax
mda-type isa-tunnel
no mda-type
Context
config>card>mda
Description
This command provisions or de-provisions an MDA to or from the device configuration for the slot.
Parameters
isa-tunnel
Specifies the ISA tunnel.
 
ISA Commands
isa
Syntax
isa
Context
config
Description
This command enables the context to configure Integrated Services Adapter (ISA) parameters.
tunnel-group
Syntax
tunnel-group tunnel-group-id [create]
no tunnel-group tunnel-group-id
Context
config>isa
Description
This command allows a tunnel group to be created or edited. A tunnel group is a set of one or more MS-ISAs that support the origination and termination of IPSec and IP/GRE tunnels. All of the MS-ISAs in a tunnel group must have isa-tunnel as their configured mda-type.
The no form of the command deletes the specified tunnel group from the configuration
Parameters
tunnel-group-id
An integer value that uniquely identifies the tunnel-group.
Values
create
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled/disabled in the environment>create context.
active-mda-number
Syntax
active-mda-number number
no active-mda-number
Context
config>isa>tunnel-grp
Description
This command specifies the number of active MS-ISA within all configured MS-ISA in the tunnel-group with multi-active enabled. IPsec traffic will be load balanced across all active MS-ISAs. If the number of configured MS-ISA is greater than the active-mda-number then the delta number of MS-ISA will be backup.
Default
no
Parameters
number
Specifies the number of active MDAs.
Values
backup
Syntax
backup mda-id
no backup
Context
config>isa>tunnel-grp
Description
This command assigns an ISA IPSec module configured in the specified slot to this IPSec group. The backup module provides the IPSec group with warm redundancy when the primary module in the group is configured. An IPSec group must always have a primary configured.
Primary and backup modules have equal operational status and when both modules are coming up, the one that becomes operational first becomes the active module. An IPSec module can serve as a backup for multiple IPSec groups but the backup can become active for only one ISA IPSec group at a time.
All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPSec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.
The operator is notified through SNMP events when:
The no form of the command removes the specified module from the IPSec group.
Default
no backup
Parameters
mda-id
Specifies the card/slot identifying a provisioned module to be used as a backup module.
Values
mda-id: slot/mda
slot 1 — up to 10 depending on chassis model
mda 1 — 2
mda
Syntax
mda mda-id
no mda
Context
config>isa>tunnel-grp
Description
This command specifies the MDA id of the MS-ISA as the member of tunnel-group with multi-active enabled. Up to 16 MDA could be configured under the same tunnel-group.
Default
no
Parameters
mda-id
Specifies the id of MS-ISA.
Values
multi-active
Syntax
[no] multi-active
Context
config>isa>tunnel-grp
Description
This command enables configuring multiple active MS-ISA in the tunnel-group. IPsec traffic will be load balanced to configured active MS-ISAs.
Note:
Default
no
primary
Syntax
primary mda-id
no primary
Context
config>isa>tunnel-grp
Description
This command assigns an ISA IPSec module configured in the specified slot to this IPSec group. The backup ISA IPSec provides the IPSec group with warm redundancy when the primary ISA IPSec in the group is configured. Primary and backup ISA IPSec have equal operational status and when both MDAs are coming up, the one that becomes operational first becomes the active ISA IPSec.
All configuration information is pushed down to the backup MDA from the CPM once the CPM gets notice that the primary module has gone down. This allows multiple IPSec groups to use the same backup module. Any statistics not yet spooled will be lost. Auto-switching from the backup to primary, once the primary becomes available again, is supported.
The operator is notified through SNMP events when:
The no form of the command removes the specified primary ID from the group’s configuration.
Default
no primary
Parameters
mda-id
Specifies the card/slot identifying a provisioned IPSec ISAA.
reassembly
Syntax
reassembly [wait-msecs]
no reassembly
Context
config>isa>tunnel-group
config>service>ies>interface>sap>gre-tunnel
config>service>vprn>interface>sap>gre-tunnel
Description
This command configures IP packet reassembly for IPSec and GRE tunnels supported by an MS-ISA. The reassembly command at the tunnel-group level configures IP packet reassembly for all IPSec and GRE tunnels associated with the tunnel-group. The reassembly command at the GRE tunnel level configures IP packet reassembly for that one specific GRE tunnel, overriding the tunnel-group configuration.
The no form of the command disables IP packet reassembly.
Default
no reassembly (tunnel-group level)
reassembly (gre-tunnel level)
Parameters
wait
Specifies the maximum number of milliseconds that the ISA tunnel application will wait to receive all fragments of a particular IPSec or GRE packet. If one or more fragments are still missing when this limit is reached the partially reassembled datagram is discarded and an ICMP time exceeded message is sent to the source host (if allowed by the ICMP configuration of the sending interface). Internally, the configured value is rounded up to the nearest multiple of 100 ms.
Values
Default
 
Certificate Profile Commands
cert-profile
Syntax
cert-profile profile-name [create]
no cert-profile profile-name
Context
config>ipsec
Description
This command creates a new cert-profile or enters the configuration context of an existing cert-profile.
The no form of the command removes the profile name from the cert-profile configuration.
Default
none
Parameters
profile-name
Specifies the name of the certification profile up to 32 characters in length.
entry
Syntax
entry entry-id [create]
no entry entry-id
Context
config>ipsec>cert-profile
Description
This command configures the certificate profile entry information
The no form of the command removes the entry-id from the cert-profile configuration.
Default
none
Parameters
entry-id
Specifies the entry ID.
Values
cert
Syntax
cert cert-filename
no cert
Context
config>ipsec>cert-profile>entry
Description
This command specifies the file name of an imported certificate for the cert-profile entry.
The no form of the command removes the cert-file-name from the entry configuration.
Default
none
key
Syntax
key key-filename
no key
Context
config>ipsec>cert-profile>entry
Description
This command specifies the filename of an imported key for the cert-profile entry.
The no form of the command removes the key-filename from the entry configuration.
Default
none
Parameters
key-filename
Specifies the filename of an imported key.
send-chain
Syntax
[no] send-chain
Context
config>ipsec>cert-profile>entry
Description
This command enters the configuration context of send-chain in the cert-profile entry.
The configuration of this command is optional, by default system will only send the certificate specified by cert command in the selected entry to the peer. This command allows system to send additional CA certificates to the peer. These additional CA certificates must be in the certificate chain of the certificate specified by the cert command in the same entry.
ca-profile
Syntax
[no] ca-profile name
Context
config>ipsec>cert-profile>entry>send-chain
Description
This command specifies a CA certificate in the specified ca-profile to be sent to the peer.
Multiple configurations (up to seven) of this command are allowed in the same entry.
Default
none
Parameters
name
Specifies the profile name up to 32 characters in length.
 
Internet Key Exchange (IKE) Commands
ipsec
Syntax
ipsec
Context
config
Description
This command enables the context to configure Internet Protocol security (IPSec) parameters. IPSec is a structure of open standards to ensure private, secure communications over Internet Protocol (IP) networks by using cryptographic security services.
trust-anchor
Syntax
trust-anchor profile-name
Context
config>ipsec
Description
This command specifies a ca-profile as a trust-anchor CA. multiple trust-anchors (up to 8) could be specified in a single trust-anchor-profile.
Parameters
profile-name
The name of ca-profile.
ike-policy
Syntax
ike-policy ike-policy-id [create]
no ike-policy ike-policy-id
Context
config>ipsec
Description
This command enables the context to configured an IKE policy.
The no form of the command
Parameters
ike-policy-id
Specifies a policy ID value to identify the IKE policy.
Values
auth-algorithm
Syntax
auth-algorithm auth-algorithm
no auth-algorithm
Context
config>ipsec>ike-policy
Description
The command specifies which hashing algorithm to use for the IKE authentication function.
The no form of the command removes the parameter from the configuration.
Parameters
md5
Specifies the hmac-md5 algorithm for authentication.
sha1
Specifies the hmac-sha1 algorithm for authentication.
sha256
Specifies the sha256 algorithm for authentication.
sha384
Specifies the sha384 algorithm for authentication.
sha512
Specifies the sha512 algorithm for authentication.
aes-xcbc
Specifies the aes-xcbc algorithm for authentication.
auth-method
Syntax
auth-method {psk|plain-psk-xauth|cert-auth|psk-radius|cert-radius|eap|auto-eap-radius}
no auth-method
Context
config>ipsec>ike-policy
Description
This command specifies the authentication method used with this IKE policy.
The no form of the command removes the parameter from the configuration.
Default
no auth-method
Parameters
psk
Both client and gateway authenticate each other by a hash derived from a pre-shared secret. Both client and gateway must have the PSK. This work with both IKEv1 and IKEv2
plain-psk-xauth
Both client and gateway authenticate each other by pre-shared key and RADIUS. This work with IKEv1 only.
psk-radius
Use the pre-shared-key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
cert-radius
Use the certificate, public/private key and RADIUS to authenticate. IKEv2 remote-access tunnel only.
eap
Use the EAP to authenticate peer. IKEv2 remote-access tunnel only
auto-eap-radius
Use EAP or potentially other method to authenticate peer. IKEv2 remote-access tunnel only. Also see auto-eap-method and auto-eap-own-method.
auto-eap-method
Syntax
auto-eap-method {psk|cert|psk-or-cert}
Context
config>ipsec>ike-policy
Description
This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:
Note that this command only applies when auth-method is configured as auto-eap-radius.
Default
auto-eap-method cert
Parameters
psk
Uses the pre-shared-key as the authentication method.
cer
Uses the certificate as the authentication method.
psk-or-cert
Uses either the pre-shared-key or certificate based on the “Auth Method” field of the received AUTH payload.
auto-eap-own-method
Syntax
auto-eap-own-method {psk|cert}
Context
config>ipsec>ike-policy
Description
This command enables following behavior for IKEv2 remote-access tunnel when auth-method is configured as auto-eap-radius:
Note that this command only applies when auth-method is configured as auto-eap-radius.
Default
auto-eap-method cert
Parameters
psk
Uses a pre-shared-key to generate AUTH payload.
cert
Uses a public/private key to generate AUTH payload.
dh-group
Syntax
dh-group {1 | 2 | 5 | 14 | 15}
no dh-group
Context
config>ipsec>ike-policy
Description
This command specifies which Diffie-Hellman group to calculate session keys. Three groups are supported with IKE-v1:
More bits provide a higher level of security, but require more processing.
Default
5
The no form of the command removes the Diffie-Hellman group specification.
dpd
Syntax
dpd [interval interval] [max-retries max-retries] [reply-only]
no dpd
Context
config>ipsec>ike-policy
Description
This command controls the dead peer detection mechanism.
The no form of the command removes the parameters from the configuration.
Parameters
interval interval
Specifies the interval that will be used to test connectivity to the tunnel peer. If the peer initiates the connectivity check before the interval timer it will be reset.
Values
Default
max-retries max-retries
Specifies the maximum number of retries before the tunnel is removed.
Values
Default
reply-only
Specifies to only reply to DPD keepalives. Issuing the command without the reply-only keyword disables the behavior.
Values
encryption-algorithm
Syntax
encryption-algorithm {des | 3des | aes128 | aes192 | aes256}
no encryption-algorithm
Context
config>ipsec>ike-policy
Description
This command specifies the encryption algorithm to use for the IKE session.
The no form of the command removes the encryption algorithm from the configuration.
Default
aes128
Parameters
des
This parameter configures the 56-bit des algorithm for encryption. This is an older algorithm, with relatively weak security. While better than nothing, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des
This parameter configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations for more security.
aes128
This parameter configures the aes algorithm with a block size of 128 bits. This is the mandatory impelmentation size for aes.
aes192
This parameter configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256
This parameter configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.
ike-mode
Syntax
ike-mode {main | aggressive }
no ike-mode
Context
config>ipsec>ike-policy
Description
This command specifies one of either two modes of operation. IKE version 1 can support main mode and aggressive mode. The difference lies in the number of messages used to establish the session.
The no form of the command removes the mode of operation from the configuration.
Default
main
Parameters
main
Specifies identity protection for the hosts initiating the IPSec session. This mode takes slightly longer to complete.
aggresive
Aggressive mode provides no identity protection but is faster.
ike-version
Syntax
ike-version [1..2]
no ike-version
Context
config>ipsec>ike-policy
Description
This command sets the IKE version (1 or 2) that the ike-policy will use.
Default
1
Parameters
1 | 2
The version of IKE protocol.
ipsec-lifetime
Syntax
ipsec-lifetime ipsec-lifetime
no ipsec-lifetime
Context
config>ipsec>ike-policy
Description
This parameter specifies the lifetime of a phase two SA.
The no form of the command reverts the ipsec-lifetime value to the default.
Default
3600 (1 hour)
Parameters
ipsec-lifetime
specifies the lifetime of the phase two IKE key in seconds.
Values
isakmp-lifetime
Syntax
isakmp-lifetime isakmp-lifetime
no isakmp-lifetime
Context
config>ipsec>ike-policy
Description
This command specifies the lifetime of a phase one SA. ISAKMP stands for Internet Security Association and Key Management Protocol
The no form of the command reverts the isakmp-lifetime value to the default.
Default
86400
Parameters
 
Specifies the lifetime of the phase one IKE key in seconds.
Values
match-peer-id-to-cert
Syntax
[no] match-peer-id-to-cert
Context
config>ipsec>ike-policy
Description
This command enables checking the IKE peer's ID matches the peer's certificate when performing certificate authentication.
nat-traversal
Syntax
nat-traversal [force] [keep-alive-interval keep-alive-interval] [force-keep-alive]
no nat-traversal
Context
config>ipsec>ike-policy
Description
This command specifies whether NAT-T (Network Address Translation Traversal) is enabled, disabled or in forced mode.
The no form of the command reverts the parameters to the default.
Default
none
Parameters
force
Forces to enable NAT-T.
keep-alive-interval keep-alive-interval
Specifies the keep-alive interval.
Values
force-keep-alive
When specified, the keep-alive does not expire.
own-auth-method
Syntax
own-auth-method {psk | cert | eap-only}
no own-auth-method
Context
config>ipsec>ike-policy
Description
This command configures the authentication method used with this IKE policy on its own side.
pfs
Syntax
pfs [dh-group {1 | 2 | 5 | 14 | 15}]
no pfs
Context
config>ipsec>ike-policy
Description
This command enables perfect forward secrecy on the IPSec tunnel using this policy. PFS provides for a new Diffie-hellman key exchange each time the SA key is renegotiated. After that SA expires, the key is forgotten and another key is generated (if the SA remains up). This means that an attacker who cracks part of the exchange can only read the part that used the key before the key changed. There is no advantage in cracking the other parts if they attacker has already cracked one.
The no form of the command disables PFS. If this it turned off during an active SA, when the SA expires and it is time to re-key the session, the original Diffie-hellman primes will be used to generate the new keys.
Default
15
Parameters
dh-group {1 | 2 | 5 14 | 15}
Specifies which Diffie-hellman group to use for calculating session keys. More bits provide a higher level of security, but require more processing. Three groups are supported with IKE-v1:
Group   1: 768 bits
Group   2: 1024 bits
Group 5:
Group 14: 2048 bits
Group 15: 3072 bits
relay-unsolicited-cfg-attribute
Syntax
relay-unsolicited-cfg-attribute
Context
config>ipsec>ike-policy
Description
This command enters relay unsolicited configuration attributes context. With this configuration, the configured attributes returned from source (such as a RADIUS server) will be returned to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
internal-ip4-dns
Syntax
[no] internal-ip4-dns
Context
config>ipsec>ike-policy>relay-unsol-attr
Description
This command will return IPv4 DNS server address from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
internal-ip4-netmask
Syntax
[no] internal-ip4-netmask
Context
config>ipsec>ike-policy>relay-unsol-attr
Description
This command will return IPv4 netmask from source (such as a RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
internal-ip6-dns
[no] internal-ip6-dns
Context
config>ipsec>ike-policy>relay-unsol-attr
Description
This command will return IPv6 DNS server address from source (e.g. RADIUS server) to IKEv2 remote-access tunnel client regardless if the client has requested it in the CFG_REQUEST payload.
static-sa
Syntax
[no] static-sa sa-name
Context
config>ipsec
Description
This command configures an IPSec static SA.
direction
Syntax
direction ipsec-direction
no direction
Context
config>ipsec>static-sa
Description
This command configures the direction for an IPSec manual SA.
The no form of the command reverts to the default value.
Default
bidirectional
Parameters
ipsec-direction
Identifies the direction to which this static SA entry can be applied.
Values
protocol
Syntax
protocol ipsec-protocol
no protocol
Context
config>ipsec>static-sa
Description
This command configures the security protocol to use for an IPSec manual SA. The no statement resets to the default value.
Parameters
ipsec-protocol
Identifies the IPSec protocol used with this static SA.
Values
Default
esp
authentication
Syntax
authentication auth-algorithm ascii-key ascii-string
authentication auth-algorithm hex-key hex-string [hash|hash2]
no authentication
Context
config>ipsec>static-sa
Description
This command configures the authentication algorithm to use for an IPSec manual SA.
The no form of the command reverts to the default value.
Default
sha1
Parameters
ascii-key
Specifies an ASCII key.
hex-key
Specifies a HEX key.
spi
Syntax
spi spi
no spi
Context
config>ipsec>static-sa
Description
This command configures the SPI key value for an IPSec manual SA.
This command specifies the SPI (Security Parameter Index) used to lookup the instruction to verify and decrypt the incoming IPSec packets when the value of the direction command is inbound.
The SPI value specifies the SPI that will be used in the encoding of the outgoing packets when the when the value of the direction command is outbound. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.
If no spi is selected, then this static SA cannot be used.
The no form of the command reverts to the default value.
Default
none
Parameters
spi
Specifies the security parameter index for this SA.
Values
ipsec-transform
Syntax
ipsec-transform transform-id [create]
Context
config>ipsec
Description
This command enables the context to create an ipsec-transform policy. IPSec transforms policies can be shared. A change to the ipsec-transform is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.
IPSec transform policy assignments to a tunnel require the tunnel to be shutdown.
The no form of the command removes the ID from the configuration.
Parameters
transform-id
Specifies a policy ID value to identify the IPSec transform policy.
Values
create
Keyword that
create
This keyword is mandatory when creating an ipsec-transform policy. The create keyword requirement can be enabled/disabled in the environment>create context.
esp-auth-algorithm
Syntax
esp-auth-algorithm {null | md5 | sha1 | sha256 | sha384 | sha512| aes-xcbc}
no esp-auth-algorithm
Context
config>ipsec>transform
Description
The command specifies which hashing algorithm should be used for the authentication function Encapsulating Security Payload (ESP). Both ends of a manually configured tunnel must share the same configuration parameters for the IPSec tunnel to enter the operational state.
The no form of the command disables the authentication.
Parameters
null
This is a very fast algorithm specified in RFC 2410, which provides no authentication.
md5
This parameter configures ESP to use the hmac-md5 algorithm for authentication.
sha1
This parameter configures ESP to use the hmac-sha1 algorithm for authentication.
sha256
This parameter configures ESP to use the sha256 algorithm for authentication.
sha384
This parameter configures ESP to use the sha384 algorithm for authentication.
sha512
This parameter configures ESP to use the sha512 algorithm for authentication.
aes-xcbc
Specifies the aes-xcbc algorithm for authentication.
esp-encryption-algorithm
Syntax
esp-encryption-algorithm {null | des | 3des | aes128 | aes192 | aes256}
no esp-encryption-algorithm
Context
config>ipsec>transform
Description
This command specifies the encryption algorithm to use for the IPSec session. Encryption only applies to esp configurations. If encryption is not defined esp will not be used.
For IPSec tunnels to come up, both ends need to be configured with the same encryption algorithm.
The no form of the command removes the
Default
aes128
Parameters
null
This parameter configures the high-speed null algorithm, which does nothing. This is the same as not having encryption turned on.
des
This parameter configures the 56-bit des algorithm for encryption. This is an older algorithm, with relatively weak security. Although slightly better than no encryption, it should only be used where a strong algorithm is not available on both ends at an acceptable performance level.
3des
This parameter configures the 3-des algorithm for encryption. This is a modified application of the des algorithm which uses multiple des operations to make things more secure.
aes128
This parameter configures the aes algorithm with a block size of 128 bits. This is the mandatory impelmentation size for aes. As of today, this is a very strong algorithm choice.
aes192
This parameter configures the aes algorithm with a block size of 192 bits. This is a stronger version of aes.
aes256
This parameter configures the aes algorithm with a block size of 256 bits. This is the strongest available version of aes.
tunnel-template
Syntax
tunnel-template ipsec template identifier [create]
no tunnel-template ipsec template identifier
Context
config>ipsec
Description
This command creates a tunnel template. Up to 2,000 templates are allowed.
Default
none
Parameters
ipsec template identifier
Specifies the template identifier.
Values
create
Mandatory keyword used when creating a tunnel-template in the IPSec context. The create keyword requirement can be enabled/disabled in the environment>create context.
clear-df-bit
Syntax
[no] clear-df-bit
Context
config>ipsec>tnl-temp
Description
This command enables clearing of the Do-not-Fragment bit.
ip-mtu
Syntax
ip-mtu octets
no ip-mtu
Context
config>ipsec>tnl-temp
Description
This command configures the template IP MTU.
Parameters
octets
Specifies the maximum size in octets.
Values
replay-window
Syntax
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context
config>ipsec>tnl-temp
Description
This command sets the anti-replay window.
The no form of the command removes the parameter from the configuration.
Default
no replay-window
Parameters
{32 | 64 | 128 | 256 | 512}
Specifies the size of the anti-replay window.
sp-reverse-route
Syntax
[no] sp-reverse-route
Context
config>ipsec>tnl-temp
Description
This command specifies whether the node using this template will accept framed-routes sent by the RADIUS server and install them for the lifetime of the tunnel as managed routes.
The no form of the command disables sp-reverse-route.
Default
no sp-reverse-route
transform
Syntax
transform transform-id [transform-id...(up to 4 max)]
no transform
Context
config>ipsec>tnl-temp
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command configures IPSec transform.
encapsulated-ip-mtu
Syntax
encapsulated-ip-mtu octets
no encapsulated-ip-mtu
Context
config>service>vprn>if>sap>ipsec-tun
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description
This command specifies the max size of encapsulated tunnel packet for the ipsec-tunnel/ip-tunnel or the dynamic tunnels terminated on the ipsec-gw. If the encapsulated v4/v6 tunnel packet exceeds the encapsulated-ip-mtu, then system will fragment the packet against the encapsulated-ip-mtu.
Parameters
octets
Specifies the max size in octets.
Values
icmp6-generation
Syntax
icmp6-generation
Context
config>service>vprn>if>sap>ipsec-tun
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description
This command enters ICMPv6 packet generation configuration context.
packet-too-big
Syntax
packet-too-big number [10..1000] seconds [1..60]
packet-too-big
no packet-too-big
Context
config>service>vprn>if>sap>ipsec-tun
config>ipsec>tnl-temp
config>service>vprn>if>sap>ip-tunnel
config>service>ies>if>sap>ip-tunnel
Description
This command enables system to send ICMPv6 PTB (Packet Too Big) message on private side and optionally specifies the rate.
With this command configured, system will send PTB back if received v6 packet on private side is bigger than 1280 bytes and also exceeds the private MTU of the tunnel.
Note that the ip-mtu command (under ipsec-tunnel or tunnel-template) specifies the private MTU for the ipsec-tunnel or dynamic tunnel.
Parameters
number
Specifies the number of PTB messages.
seconds
Specifies the number of seconds.
ip-mtu
Syntax
ip-mtu octets
no ip-mtu
Context
config>ipsec>tnl-temp>
Description
This command continues the template IP MTU.
 
 
IPSec Configuration Commands
ipsec
Syntax
ipsec
Context
config>service>vprn>ipsec
Description
This command enables the context to configure IPSec policies.
Default
none
cert-profile
Syntax
cert-profile profile-name
no cert-profile
Context
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description
This command specifies the cert-profile for the ipsec-tunnel or ipsec-gw. This command will override cert and key configuration under the ipsec-tunnel or ipsec-gw.
Default
none
Parameters
profile-name
Specifies the name of cert-profile.
security-policy
security-policy security-policy-id [create]
no security-policy security-policy-id
Context
config>service>vprn>ipsec
Description
This command configures a security policy to use for an IPSec tunnel.
Default
none
Parameters
security-policy-id
specifies a value to be assigned to a security policy.
Values
create
Keyword used to create the security policy instance. The create keyword requirement can be enabled/disabled in the environment>create context.
entry
Syntax
entry entry-id [create]
no entry entry-id
Context
config>service>vprn>ipsec>sec-plcy
Description
This command configures an IPSec security policy entry.
Parameters
entry-id
Specifies the IPSec security policy entry.
Values
create
Keyword used to create the security policy entry instance. The create keyword requirement can be enabled/disabled in the environment>create context.
local-ip
Syntax
local-ip {ip-prefix/prefix-length | ip-prefix netmask | any}
Context
config>service>vprn>ipsec>sec-plcy>entry
Description
This command configures the local (from the VPN ) IP prefix/mask for the policy parameter entry.
Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.
Parameters
ip-prefix
The destination address of the aggregate route in dotted decimal notation.
Values
netmask
The subnet mask in dotted decimal notation.
any
keyword to specify that it can be any address.
local-v6-ip
Syntax
local-v6-ip ipv6-prefix/prefix-length
local-v6-ip any
no local-v6-ip
Context
config>service>vprn>ipsec>sec-plcy>entry
Description
This command specifies the local v6 prefix for the security-policy entry.
Parameters
ipv6-prefix/prefix-length
Specifies the local v6 prefix and length.
Values
any
keyword to specify that it can be any address.
remote-ip
Syntax
remote-ip ip-prefix/prefix-length | ip-prefix netmask | any}
Context
config>service>vprn>ipsec>sec-plcy>entry
Description
This command configures the remote (from the tunnel) IP prefix/mask for the policy parameter entry.
Only one entry is necessary to describe a potential flow. The local-ip and remote-ip commands can be defined only once. The system will evaluate the local IP as the source IP when traffic is examined in the direction of VPN to the tunnel and as the destination IP when traffic flows from the tunnel to the VPN. The remote IP will be evaluated as the source IP when traffic flows from the tunnel to the VPN when traffic flows from the VPN to the tunnel.
Parameters
ip-prefix
The destination address of the aggregate route in dotted decimal notation.
Values
netmask
The subnet mask in dotted decimal notation.
any
keyword to specify that it can be any address.
remote-v6-ip
Syntax
remote-v6-ip any
remote-v6-ip ipv6-prefix/prefix-length
no remote-v6-ip
Context
config>service>vprn>ipsec>sec-plcy>entry
Description
This command specifies the remote v6 prefix for the security-policy entry.
Parameters
ipv6-prefix/prefix-length
Specifies the local v6 prefix and length.
Values
any
keyword to specify that it can be any address.
address
Syntax
address ipv6-address/prefix-length [eui-64] [preferred] [track-srrp srrp-instance]
no address ipv6-address/prefix-length
Context
config>service>vprn>if>ipv6
Description
This command add an IPv6 address to the tunnel interface.
Note: the prefix length must be 96 or higher
Parameters
ipv6-address/prefix-length
Specifies the IPv6 address on the interface.
Values
eui-64
When the eui-64 keyword is specified, a complete IPv6 address from the supplied prefix and 64-bit interface identifier is formed. The 64-bit interface identifier is derived from MAC address on Ethernet interfaces. For interfaces without a MAC address, for example ATM interfaces, the Base MAC address of the chassis is used.
preferred
specifies that the IPv6 address is the preferred IPv6 address for this interface. Preferred address is an address assigned to an interface whose use by upper layer protocols is unrestricted. Preferred addresses maybe used as the source (or destination) address of packets sent from (or to) the interface. Preferred address doesn’t go through the DAD process.
link-local-address
Syntax
link-local-address ipv6-address [preferred]
Context
config>service>vprn>if>ipv6
Description
This command specifies the link-local-address for the tunnel interface.
Note: Only one link-local-address is allowed per interface
Parameters
ipv6-address
Specifies the IPv6 address on the interface.
Values
preferred
specifies that the IPv6 address is the preferred IPv6 address for this interface. Preferred address is an address assigned to an interface whose use by upper layer protocols is unrestricted. Preferred addresses maybe used as the source (or destination) address of packets sent from (or to) the interface. Preferred address doesn’t go through the DAD process.
dynamic-tunnel-redundant-next-hop
Syntax
dynamic-tunnel-redundant-next-hop ip-address
no dynamic-tunnel-redundant-next-hop
Context
config>service>ies>if
config>service>vprn>if
Description
This command configures the dynamic ISA tunnel redundant next-hop address.
Default
no dynamic-tunnel-redundant-next-hop
Parameters
ip-address
Specifies the IP address of the next hop.
static-tunnel-redundant-next-hop
Syntax
static-tunnel-redundant-next-hop ip-address
no static-tunnel-redundant-next-hop
Context
config>service>ies>if
config>service>vprn>if
Description
This command specifies redundant next-hop address on public or private IPSec interface (with public or private tunnel-sap) for static IPSec tunnel. The specified next-hop address will be used by standby node to shunt IPSec traffic to master in case of it receives them.
The next-hop address will be resolved in routing table of corresponding service.
Default
no static-tunnel-redundant-next-hop
Parameters
ip-address
Specifies the IP address of the next hop.
interface
Syntax
interface ip-int-name [create] [tunnel]
no interface ip-int-name
Context
config>service>vprn
Description
This command creates a logical IP routing interface for a Virtual Private Routed Network (VPRN). Once created, attributes like an IP address and service access point (SAP) can be associated with the IP interface.
The interface command, under the context of services, is used to create and maintain IP routing interfaces within VPRN service IDs. The interface command can be executed in the context of an VPRN service ID. The IP interface created is associated with the service core network routing instance and default routing table. The typical use for IP interfaces created in this manner is for subscriber internet access.
Interface names are case sensitive and must be unique within the group of defined IP interfaces defined for config router interface and config service vprn interface. Interface names must not be in the dotted decimal notation of an IP address. For example, the name “1.1.1.1” is not allowed, but “int-1.1.1.1” is allowed. Show commands for router interfaces use either interface names or the IP addresses. Use unique IP address values and IP address names to maintain clarity. It could be unclear to the user if the same IP address and IP address name values are used. Although not recommended, duplicate interface names can exist in different router instances.
The available IP address space for local subnets and routes is controlled with the config router service-prefix command. The service-prefix command administers the allowed subnets that can be defined on service IP interfaces. It also controls the prefixes that may be learned or statically defined with the service IP interface as the egress interface. This allows segmenting the IP address space into config router and config service domains.
When a new name is entered, a new logical router interface is created. When an existing interface name is entered, the user enters the router interface context for editing and configuration.
By default, there are no default IP interface names defined within the system. All VPRN IP interfaces must be explicitly defined. Interfaces are created in an enabled state.
The no form of this command removes IP the interface and all the associated configuration. The interface must be administratively shutdown before issuing the no interface command.
For VPRN services, the IP interface must be shutdown before the SAP on that interface may be removed. VPRN services do not have the shutdown command in the SAP CLI context. VPRN service SAPs rely on the interface status to enable and disable them.
Parameters
ip-int-name
Specifies the name of the IP interface. Interface names can be from 1 to 32 alphanumeric characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes.
Values
tunnel
Specifies that the interface is configured as tunnel interface, which could be used to terminate IPSec or GRE tunnels in the private service.
create
Keyword used to create the IPSec interface instance. The create keyword requirement can be enabled/disabled in the environment>create context.
sap
Syntax
sap sap-id [create]
no sap sap-id
Context
config>service>ies>if
config>service>vprn>if
Description
This command creates a Service Access Point (SAP) within a service. A SAP is a combination of port and encapsulation parameters which identifies the service access point on the interface and within the router. Each SAP must be unique.
All SAPs must be explicitly created. If no SAPs are created within a service or on an IP interface, a SAP will not exist on that object.
Enter an existing SAP without the
create keyword to edit SAP parameters. The SAP is owned by the service in which it was created.
A SAP can only be associated with a single service. A SAP can only be defined on a port that has been configured as an access port using the config interface port-type port-id mode access command. Channelized TDM ports are always access ports.
If a port is shutdown, all SAPs on that port become operationally down. When a service is shutdown, SAPs for the service are not displayed as operationally down although all traffic traversing the service will be discarded. The operational state of a SAP is relative to the operational state of the port on which the SAP is defined.
The no form of this command deletes the SAP with the specified port. When a SAP is deleted, all configuration parameters for the SAP will also be deleted.
Default
No SAPs are defined.
Special Cases
sap tunnel-id.private | public:tag — This parameter associates a tunnel group SAP with this interface.
This context will provide a SAP to the tunnel. The operator may associate an ingress and egress QoS policies as well as filters and virtual scheduling contexts. Internally this creates an Ethernet SAP that will be used to send and receive encrypted traffic to and from the MDA. Multiple tunnels can be associated with this SAP. The “tag” will be a dot1q value. The operator may see it as an identifier. The range is limited to 1 — 4094.
Parameters
sap-id
Specifies the physical port identifier portion of the SAP definition. See Appendix A: Common CLI Command Descriptions for command syntax.
port-id
Specifies the physical port ID in the slot/mda/port format.
If the card in the slot has Media Dependent Adapters (MDAs) installed, the port-id must be in the slot_number/MDA_number/port_number format. For example 61/2/3 specifies port 3 on MDA 2 in slot 61.
The port-id must reference a valid port type. When the port-id parameter represents SONET/SDH and TDM channels the port ID must include the channel ID. A period “.” separates the physical port from the channel-id. The port must be configured as an access port.
If the SONET/SDH port is configured as clear-channel then only the port is specified.
create
Keyword used to create a SAP instance.
ipsec-tunnel
Syntax
ipsec-tunnel ipsec-tunnel-name [create]
no ipsec-tunnel ipsec-tunnel-name
Context
config>service>vprn>if>sap
config>service>vprn>if>sap>ipsec-tun
Description
This command specifies an IPSec tunnel name. An IPSec client sets up the encrypted tunnel across public network. The 7750-SR IPSec MDA acts as a concentrator gathering, and terminating these IPSec tunnels into an IES or VPRN service. This mechanism allows as service provider to offer a global VPRN service even if node of the VPRN are on an uncontrolled or insecure portion of the network.
Default
none
Parameters
ipsec-tunnel-name
Specifies an IPSec tunnel name up to 32 characters in length.
create
Keyword used to create the IPSec tunnel instance. The create keyword requirement can be enabled/disabled in the environment>create context.
bfd-designate
Syntax
[no] bfd-designate
Context
config>service>vprn>if>sap>ipsec-tunnel
Description
This command specifies whether this IPSec tunnel is the BFD designated tunnel.
Default
none
bfd-enable
Syntax
[no] bfd-enable service service-id interface interface-name dst-ip ip-address
Context
config>service>vprn>if>tunnel
Description
This command assign a BFD session provide heart-beat mechanism for given IPSec tunnel. There can be only one BFD session assigned to any given IPSec tunnel, but there can be multiple IPSec tunnels using same BFD session. BFD control the state of the associated tunnel, if BFD session goes down, system will also bring down the associated non-designated IPSec tunnel.
Default
none
Parameters
service service-id
Specifies where the service-id that the BFD session resides.
interface interface-name
Specifies the name of the interface used by the BFD session.
dst-ip ip-address
Specifies the destination address to be used for the BFD session.
dynamic-keying
Syntax
[no] dynamic-keying
Context
config>service>vprn>if>tunnel
Description
This command enables dynamic keying for the IPSec tunnel.
Default
none
auto-establish
Syntax
[no] auto-establish
Context
config>service>vprn>if>tunnel
Description
This command specifies whether to attempt to establish a phase 1 exchange automatically.
The no form of the command disables the automatic attempts to establish a phase 1 exchange.
Default
no auto-establish
transform
Syntax
transform transform-id [transform-id...(up to 4 max)]
no transform
Context
config>service>vprn>if>tunnel>dynamic-keying
Description
This command associates the IPSec transform sets allowed for this tunnel. A maximum of four transforms can be specified. The transforms are listed in decreasing order of preference (the first one specified is the most preferred).
Default
none
Parameters
transform-id
Specifies the value used for transforms for dynamic keying.
Values
manual-keying
Syntax
[no] manual-keying
Context
config>service>vprn>if>tunnel
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command configures Security Association (SA) for manual keying. When enabled, the command specifies whether this SA entry is created manually by the user or dynamically by the IPSec sub-system.
Default
none
security-association
Syntax
security-association security-entry-id authentication-key authentication-key encryption-key encryption-key spi spi transform transform-id direction {inbound | outbound}
no security-association security-entry-id direction {inbound | outbound}
Context
config>service>vprn>if>tunnel>manual-keying
config>service>ies>if>sap>ipsec-gateway>manual-keying
config>service>vprn>if>sap>ipsec-gateway>manual-keying
Description
This command configures the information required for manual keying SA creation.
Default
none
Parameters
security-entry-id
Specifies the ID of an SA entry.
Values
encryption-key encryption-key
specifies the key used for the encryption algorithm.
Values
authentication-key authentication-key
 
Values
spi spi
Specifies the SPI (Security Parameter Index) used to look up the instruction to verify and decrypt the incoming IPSec packets when the direction is inbound. When the direction is outbound, the SPI that will be used in the encoding of the outgoing packets. The remote node can use this SPI to lookup the instruction to verify and decrypt the packet.
Values
transform transform-id
specifies the transform entry that will be used by this SA entry. This object should be specified for all the entries created which are manual SAs. If the value is dynamic, then this value is irrelevant and will be zero.
Values
direction {inbound | outbound}
Specifies the direction of an IPSec tunnel.
replay-window
Syntax
replay-window {32 | 64 | 128 | 256 | 512}
no replay-window
Context
config>service>vprn>if>tunnel>manual keying
Description
This command specifies the size of the anti-replay window. The anti-replay window protocol secures IP against an entity that can inject messages in a message stream from a source to a destination computer on the Internet.
Default
none
Parameters
{32 | 64 | 128 | 256 | 512}
Specifies the size of the SA anti-replay window.
security-policy
Syntax
security-policy security-policy-id
no security-policy
Context
config>service>vprn>ipsec-if>tunnel
Description
This command configures an IPSec security policy. The policy may then be associated with tunnels defined in the same context.
Default
none
Parameters
security-policy-id
Specifies the IPSec security policy entry that the tunnel will use.
Values
Interface SAP Tunnel Commands
ip-tunnel
Syntax
ip-tunnel ip-tunnel-name [create]
no ip-tunnel ip-tunnel-name
Context
config>service>ies>sap
config>service>vprn>sap
Description
This command is used to configure an IP-GRE or IP-IP tunnel and associate it with a private tunnel SAP within an IES or VPRN service.
The no form of the command deletes the specified IP/GRE or IP-IP tunnel from the configuration. The tunnel must be administratively shutdown before issuing the no ip-tunnel command.
Default
no IP tunnels are defined.
Parameters
ip-tunnel-name
Specifies the name of the IP tunnel. Tunnel names can be from 1 to 32 alphanumeric characters. If the string contains special characters (for example, #, $, spaces), the entire string must be enclosed within double quotes.
source
Syntax
source ip-address
no source
Context
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description
This command sets the source IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. It must be an address in the subnet of the associated public tunnel SAP interface. The GRE tunnel does not come up until a valid source address is configured.
The no form of the command deletes the source address from the GRE tunnel configuration. The tunnel must be administratively shutdown before issuing the no source command.
Parameters
ip-address
Specifies the source IPv4 address of the GRE tunnel.
Values
remote-ip
Syntax
remote-ip ip-address
no remote-ip
Context
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description
This command sets the primary destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If this address is reachable in the delivery service (there is a route) then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.
The no form of the command deletes the destination address from the GRE tunnel configuration.
Parameters
ip-address
Specifies the destination IPv4 address of the GRE tunnel.
Values
backup-remote-ip
Syntax
backup-remote-ip ip-address
no backup-remote-ip
Context
config>service>interface>ies>sap>gre-tunnel
config>service>interface>vprn>sap>gre-tunnel
Description
This command sets the backup destination IPv4 address of GRE encapsulated packets associated with a particular GRE tunnel. If the primary destination address is not reachable in the delivery service (there is no route) or not defined then this is the destination IPv4 address of GRE encapsulated packets sent by the delivery service.
The no form of the command deletes the backup-destination address from the GRE tunnel configuration.
Parameters
ip-address
Specifies the destination IPv4 address of the GRE tunnel.
Values
clear-df-bit
Syntax
[no] clear-df-bit
Context
config>service>vprn>interface>sap>ipsec-tunnel
config>service>vprn>interface>sap>gre-tunnel
config>service>ies>interface>sap>gre-tunnel
Description
This command instructs the MS-ISA to reset the DF bit to 0 in all payload IP packets associated with the GRE or IPSec tunnel, before any potential fragmentation resulting from the ip-mtu command. (This will require a modification of the header checksum.) The no clear-df-bit command, corresponding to the default behavior, leaves the DF bit unchanged.
The no form of the command disables the DF bit reset.
Default
none
delivery-service
Syntax
delivery-service {service-id | svc-name}
no delivery-service
Context
config>service>interface>ies>sap>delivery-service
config>service>interface>vprn>sap>gre-tunnel
Description
This command sets the delivery service for GRE encapsulated packets associated with a particular GRE tunnel. This is the IES or VPRN service where the GRE encapsulated packets are injected and terminated. The delivery service may be the same service that owns the private tunnel SAP associated with the GRE tunnel. The GRE tunnel does not come up until a valid delivery service is configured.
The no form of the command deletes the delivery-service from the GRE tunnel configuration.
Parameters
service-id
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel.
Values
svc-name
Identifies the service used to originate and terminate the GRE encapsulated packets belonging to the GRE tunnel.
Values
dscp
Syntax
dscp dscp-name
no dscp
Context
config>service>interface>ies>sap
config>service>interface>vprn>sap>gre-tunnel
Description
This command sets the DSCP code-point in the outer IP header of GRE encapsulated packets associated with a particular GRE tunnel. The default, set using the no form of the command, is to copy the DSCP value from the inner IP header (after remarking by the private tunnel SAP egress qos policy) to the outer IP header.
Default
no dscp
Parameters
dscp
Specifies the DSCP code-point to be used.
Values
dest-ip
Syntax
dest-ip ip-address
Context
config>service>ies>interface>sap>ip-tunnel
config>service>vprn>interface>sap>ip-tunnel
config>service>vprn>sap>ipsec-tunnel
Description
This command configures configures a private IPv4 or IPv6 address of the remote tunnel endpoint. A tunnel can have up to 16 dest-ip commands. At least one dest-ip address is required in the configuration of a tunnel. A tunnel does not come up operationally unless all dest-ip addresses are reachable (part of a local subnet).
Note: Unnumbered interfaces are not supported.
Default
No default
Parameters
ip-address
Specifies the private IPv4 or IPv6 address of the remote IP tunnel endpoint. If this remote IP address is not within the subnet of the IP interface associated with the tunnel then the tunnel will not come up.
Values
gre-header
Syntax
gre-header send-key send-key receive-key receive-key
Context
config>service>ies>sap>ip-tunnel
config>service>vprn>sap>ip-tunnel
Description
This command configures the type of the IP tunnel. If the gre-header command is configured then the tunnel is a GRE tunnel with a GRE header inserted between the outer and inner IP headers. If the no form of the command is configured then the tunnel is a simple IP-IP tunnel.
Default
no gre-header
Parameters
send-key send-key
Specifies a 32-bit unsigned integer.
Values
receive-key receive-key
Specifies a 32-bit unsigned integer.
Values
ip-mtu
Syntax
ip-mtu octets
no ip-mtu
Context
config>service>ies>if>sap>gre-tunnel
config>service>vprn>if>sap>gre-tunnel
config>service>vprn>if>sap>ipsec-tunnel
Description
This command configures the IP maximum transmit unit (packet) for this interface.
Note that because this connects a Layer 2 to a Layer 3 service, this parameter can be adjusted under the IES interface.
The MTU that is advertized from the IES size is:
MINIMUM((SdpOperPathMtu - EtherHeaderSize), (Configured ip-mtu))
By default (for ethernet network interface) if no ip-mtu is configured it is (1568 - 14) = 1554.
The ip-mtu command instructs the MS-ISA to perform IP packet fragmentation, prior to IPSec encryption and encapsulation, based on the configured MTU value. In particular:
If the length of a payload IP packet (including its header) exceeds the configured MTU value and the DF flag is set (because the original DF value was 1 and the tunnel has no clear-df-bit in its configuration) then the MS-ISA discards the payload packet without sending an ICMP type 3/code 4 message back to the packet’s source address.
The no ip-mtu command, corresponding to the default behavior, disables fragmentation of IP packets by the MS-ISA; all IP packets, regardless of size or DF bit setting, are allowed into the tunnel.
Note that the effective MTU for packets entering a tunnel is the minimum of the private tunnel SAP interface IP MTU value (used by the IOM) and the tunnel IP MTU value (configured using the above command and used by the MS-ISA). So if it desired to fragment IP packets larger than X bytes with DF set, rather than discarding them, the tunnel IP MTU should be set to X and the private tunnel SAP interface IP MTU should be set to a value larger than X.
Default
no ip-mtu
reassembly
Syntax
reassembly [wait-msecs]
no reassembly
Context
config>service>ies>if>sap
Description
This command configures the reassembly wait time.
 
 
 
IPSec Gateway Commands
ipsec-gw
Syntax
[no] ipsec-gw
Context
config>service>ies>if>sap
config>service>vprn>if>sap
Description
This command configures an IPSec gateway.
default-secure-service
Syntax
default-secure-service service-id ipsec-interface ip-int-name
no default-secure-service
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command specifies a service ID or service name of the default security service used by this SAP IPSec gateway.
Parameters
service-id
Specifies a default secure service.
Values
service-id: 1 — 2147483648
svc-name: An existing service name up to 64 characters in length.
default-tunnel-template
Syntax
default-tunnel-template ipsec template identifier
no default-tunnel-template
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command configures a default tunnel policy template for the gateway.
dhcp
Syntax
[no] dhcp
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command enters the context of DHCPv4-based address assignment for IKEv2 remote-access tunnel.
The system will act as DHCPv4 client on behalf of IPSec client and also a relay agent to relay DHCPv4 packet to DHCPv4 server.
DHCPv4 DORA(Discovery/Offer/Request/Ack) exchange happens during IKEv2 remote-access tunnel setup. And system also supports standard renew
In order to use this feature, the relay-proxy must be enabled on the corresponding interface (either the private interface or the interface that has the gi-address as the interface address.
Default
no dhcp
gi-address
Syntax
gi-address ip-address
no gi-address
Context
config>service>ies>if>sap>ipsec-gateway>dhcp
config>service>vprn>if>sap>ipsec-gateway>dhcp
Description
This command specifies the gi-address of the DHCPv4 packet sent by system.
Default
no gi-address
Parameters
ip-address
Specifies the host IP address to be used for DHCP relay packets.
send-release
Syntax
[no] send-release
Context
config>service>ies>if>sap>ipsec-gateway>dhcp
config>service>vprn>if>sap>ipsec-gateway>dhcp
Description
This command enable system to send DHCPv4 release when the IPSec tunnel is removed.
 
server
Syntax
server ip-address [ip-address...(upto 8 max)] router router-instance
server ip-address [ip-address...(upto 8 max)] service-name service-name
no server
Context
config>service>ies>if>sap>ipsec-gateway>dhcp
config>service>vprn>if>sap>ipsec-gateway>dhcp
Description
This command specifies one or more (up to 8) DHCPv4 server address for DHCPv4-based address assignment. In case that multiple server addresses are specified, the first received DHCPv4 offered will be chosen for address assignment.
Default
no server
Parameters
ip-address
Species a unicast IPv4 address
router router-instance
Specifies the router instance id used to reach the configured server address.
service-name service-name
Specifies the name of the VPRN service used to reach the configured server address.
ike-policy
Syntax
ike-policy ike-policy-id
no ike-policy
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command configures IKE policy for the gateway.
Parameters
ike-policy-id
Specifies the IKE policy ID.
Values
local-address-assignment
Syntax
[no] local-address-assignment
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command enables the context to configure local address assignments for the IPSec gateway.
ipv4
Syntax
ipv4
Context
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description
This command enables the context to configure IPv4 local address assignment parameters for the IPSec gateway.
address-source
Syntax
address-source router router-instance dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool
address-source service-name service-name dhcp-server local-dhcp4-svr-name pool dhcp4-server-pool
address-source router router-instance dhcp-server local-dhcp6-svr-name pool dhcp4-server-pool
address-source service-name service-name dhcp-server local-dhcp6-svr-name pool dhcp4-server-pool
no address-source
Context
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv4
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign>ipv6
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign>ipv6
Description
This command specifies the source of the local address assignment for the ipsec-gw, which is a pool of a local DHCPv4 or DHCPv6 server. The system will assign an internal address to IKEv2 remote-access client from the specified pool.
Beside the IP address, netmask and DNS could also be returned. For IPv4, netmask and DNS server address could be returned from the specified pool, the netmask return to IPsec client is derived from subnet length from “subnet x.x.x.x/m create” configuration, not the “subnet-mask” configuration in the subnet context; For IPv6, the DNS server address could be returned from specified pool.
Default
no address-source
Parameters
router router-instance-id
Specifies the router instance ID where local DHCPv4 or DHCPv6 server is defined.
service-name service-name
Specifies the name of the service where local DHCPv4 or DHCPv6 server is defined.
dhcp-server local-svr-svr-name
Specifies the name of local DHCPv4 or DHCv6 server.
pool pool-name
Specifies the name of the pool defined in the specified server.
ipv6
Syntax
ipv6
Context
config>service>ies>if>sap>ipsec-gw>lcl-addr-assign
config>service>vprn>if>sap>ipsec-gw>lcl-addr-assign
Description
This command enables the context to configure IPv6 local address assignment parameters for the IPSec gateway.
local-gateway-address
Syntax
local-gateway-address ip-address
no local-gateway-address
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command configures local gateway address of the IPSec gateway..
Default
none
Parameters
ip-address
Specifies a unicast IPv4 address or a global unicast IPv6 address. This address must be within the subnet of the public interface.
local-gateway-address
Syntax
local-gateway-address ip-address peer ip-address delivery-service service-id
no local-gateway-address
Context
config>service>vprn>if>sap>ipsec-tunnel
Description
This command specifies the local gateway address used for the tunnel and the address of the remote security gateway at the other end of the tunnelremote peer IP address to use.
Default
The base routing context is used if the delivery-router option is not specified.
Parameters
ip-address
IP address of the local end of the tunnel.
delivery-service service-id
The ID of the IES or VPRN (front-door) delivery service of this tunnel. Use this service-id to find the VPRN used for delivery.
Values
service-id: 1 — 2147483648
svc-name: Specifies an existing service name up to 64 characters in length.
local-id
Syntax
local-id type {ipv4 | fqnd | ipv6} [value [255 chars max]]
no local-id
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
service>vprn>if>sap>ipsec-tun>dyn
Description
This command specifies the local ID for 7750 SRs used for IDi or IDr for IKEv2 tunnels.
The no form of the command removes the parameters from the configuration.
Default
Depends on local-auth-method like following:
Parameters
type
Specifies the type of local ID payload, it could be IPv4 or IPv6 address/FQDN domain name, distinguish name of subject in X.509 certificate.
ipv4
Specifies to use IPv4 as the local ID type, the default value is the local tunnel end-point address.
ipv6
Specifies to use IPv6 as the local ID type, the default value is the local tunnel end-point address.
fqnd
Specifies to use FQDN as the local ID type. The value must be configured.
pre-shared-key
Syntax
pre-shared-key key
no pre-shared-key
Context
config>service>ies>if>sap>ipsec-gateway
config>service>vprn>if>sap>ipsec-gateway
Description
This command specifies the shared secret between the two peers forming the tunnel.
Parameters
key
Specifies a pre-shared-key for dynamic-keying.
radius-accounting-policy
Syntax
radius-accounting-policy policy-name
no radius-accounting-policy
Context
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description
This command specifies the radius-accounting-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-accounting-policy is defined under config>ipsec context.
Default
none
Parameters
policy-name
Specifies the name of an existing radius-accounting-policy.
radius-authentication-policy
Syntax
radius-authentication-policy policy-name
no radius-authentication-policy
Context
config>service>ies>if>sap>ipsec-gw
config>service>vprn>if>sap>ipsec-gw
Description
This command specifies the radius-authentication-policy to be used for the IKEv2 remote-access tunnels terminated on the ipsec-gw. The radius-authentication-policy is is defined under config>ipsec context.
Default
none
Parameters
policy-name
Specifies the name of an existing radius-authentication-policy.
cert
Syntax
cert
Context
config>service>ies>if>sap>ipsec-tunnel
Description
This command configures cert parameters used by this SAP IPSec gateway.
cert
Syntax
[no] cert local-file-url
Default
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dynamic-keying>cert
config>svc>vprn>if>sap>ipsec-gw>cert>
Description
This command specifies the certificate that 7750 used to identify itself in case peer need it. 7750 will load (reload) the certificate from the configured URL when the ipsec-tunnel/ipsec-gw is “no shutdown”.
When system is loading the certificate, it will check if it is a valid X.509v3 certificate by performing following:
key file must be already configured
If any of above checks fails, then the “no shutdown” command will fails
Configured certificate file url can only be changed or removed when tunnel or gw is shutdown.
Same certificate could be used for multiple ipsec-tunnels or ipsec-gws, however for each certificate file, there is only one memory instance, if a certificate file has been updated, “no shutdown” in any of tunnel that use the certificate file will cause the memory instance updated, which will not impact the current up and running tunnels that use the certificate file, but the new authentication afterwards will use the updated memory instance. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.
Default
None
Parameters
local-file-url
URL for input file, this url is local CF card URL.
key
Syntax
[no] key local-file-url
Context
config>service>vprn>if>sap>ipsec-tun>dynamic-keying>cert
config>svc>vprn>if>sap>ipsec-gw>cert
config>service>ies>if>sap>ipsec-gateway>cert
Description
This command specifies the key pair file 7750 will use for X.509 certificate authentication. System will load the key file when the ipsec-tunnel/gw is “no shutdown”
When system is loading the key file, it will check if it is a valid 7750 formatted key file.
Key file url can only be changed or removed when tunnel or gw is shutdown.
Same key could be used for multiple ipsec-tunnels or ipsec-gws, however for each key file, there is only one memory instance, if a key file has been updated, “no shutdown” in any of tunnel that use the key file will cause the memory instance updated, which will not impact the current up and running tunnels that use the key file, but the new authentication afterwards will use the updated memory instance. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.
Default
None
Parameters
local-file-url
URL for input file, this url is local CF card URL.
status-verify
Syntax
status-verify
Context
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description
This command enables the context to configure certificate recovation status verification parameters.
Default
none
default-result
Syntax
default-result {revoked|good}
no default-result
Context
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>>cert-status-verify
Description
This command specifies the default result when both the primary and secondary method failed to provide an answer.
Default
default-result revoked
Parameters
good
Specifies that the certificate is considered as acceptable.
revoked
Specifies that the certificate is considered as revoked.
primary
Syntax
primary {ocsp|crl}
no primary
Context
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>cert-status-verify
Description
This command specifies the primary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP
OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.
Default
primary crl
Parameters
ocsp
Specifies to use the OCSP protocol. The OCSP server is configured in the corresponding ca-profile.
crl
Specifies to use the local CRL file The CRL file is configured in the corresponding ca-profile
secondary
Syntax
secondary {ocsp|crl}
no secondary
Context
config>service>ies>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-gw>cert>cert-status-verify
config>service>vprn>if>sap>ipsec-tun>dyn>cert>cert-status-verify
Description
This command specifies the secondary method that used to verify revocation status of the peer’s certificate; could be either CRL or OCSP.
OCSP or CRL will use the corresponding configuration in the ca-profile of the issuer of the certificate in question.
secondary method will only be used when the primary method failed to provide an answer:
Default
no secondary
Parameters
ocsp
Specifies to use the OCSP protocol, the OCSP server is configured in the corresponding ca-profile.
crl
Specifies to use the local CRL file, the CRL file is configured in the corresponding ca-profile
auto-establish
Syntax
[no] auto-establish
Context
config>service>vprn>if>sap>ipsec-tun>dynamic-keyig
Description
The system will automatically establish phase 1 SA as soon as the tunnel is provisioned and enabled (no shutdown). This option should only be configured on one side of the tunnel.
Note that any associated static routes will remain up as long as the tunnel could be up, even though it may actually be Oper down according to the CLI.
Default
None
trust-anchor-profile
Syntax
trust-anchor-profile name
no trust-anchor-profile
Context
config>service>ies>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description
This command specifies the trust-anchor-profile for the ipsec-tunnel or ipsec-gw. This command will override “trust-anchor” configuration under the ipsec-tunnel or ipsec-gw.
Default
No
Parameters
profile-name
Specifies the name of trust-anchor-profile.
trust-anchor
Syntax
trust-anchor ca-profile-name
no trust-anchor
Context
config>service>ies>if>sap>ipsec-gateway>cert
config>service>vprn>if>sap>ipsec-gw>cert
config>service>vprn>if>sap>ipsec-tun>dyn>cert
Description
This command configures trust anchor with a CA profile used by this SAP IPSec gateway. Since 12.0R1, user should use cert-profile instead. This command will be deprecated in future release.
Parameters
name
Specifies the CA profile to use in the trust anchor. Specify a file name, 95 characters maximum.
ts-list
Syntax
ts-list list-name [create]
no ts-list list-name
Context
config>ipsec
Description
This command creates a new TS list.
The no form of the command removes the list name from the configuration.
Parameters
list-name
Specifies the name of the ts-list list.
local
Syntax
local
Context
config>ipsec>ts-list
Description
This command enables the context to configure local ts-list parameters. The traffic selector of the local system, such as TSr when the system acts as a IKEv2 responder.
entry
Syntax
entry entry-id [create]
no entry entry-id
Context
config>ipsec>ts-list>local
Description
This command specifies a ts-list entry.
The no form of the command removes the entry from the local configuration.
Parameters
entry-id
Specifies the entry id.
Values
address
Syntax
address prefix ip-prefix/ip-prefix-len
address from begin-ip-address to end-ip-address
no address
Context
config>ipsec>ts-list>local>entry
Description
This command specifies the address range in the IKEv2 traffic selector.
Parameters
ip-prefix/ip-prefix-len
Specifies the IP subnet and prefix.
begin-ip-address
Specifies the beginging address of the range for this entry.
end-ip-address
Specifies the address type of ending address of the range for this entry.
ts-negotiation
Syntax
ts-negotiation ts-list list-name
no ts-negotiation
Context
config>service>ies>if>sap>ipsec-gw
Description
This command enables the IKEv2 traffic selector negotiation with the specified ts-list.
Parameters
ts-list list-name
Specifies the ts-list name.
IPSec Mastership Election Commands
multi-chassis
Syntax
multi-chassis
Context
config>redundancy
Description
Thiis command enables the context to configure multi-chassis parameters.
peer
Syntax
peer ip-address [create]
no peer ip-address
Context
config>redundancy
Description
This command configures a multi-chassis redundancy peer.
Parameters
ip-address
Specifies the peer address.
create
Mandatory keyword used when creating tunnel group in the ISA context. The create keyword requirement can be enabled/disabled in the environment>create context.
mc-ipsec
Syntax
[no] mc-ipsec
Context
config>redundancy>multi-chassis>peer
Description
This command enables the context to configure multi-chassis peer parameters.
bfd-enable
Syntax
[no] bfd-enable
Context
config>redundancy>multi-chassis>peer>mc-ipsec
Description
This command enables tracking a central BFD session, if the BFD session goes down, then system consider the peer is down and change the mc-ipsec status of configured tunnel-group accordingly.
The BFD session uses specified the loopback interface (in the specified service) address as the source address and uses specified dst-ip as the destination address. Other BFD parameters are configured with the bfd command on the specified interface.
Default
300
discovery-interval
Syntax
discovery-interval interval-secs [boot interval-secs]
no discovery-interval
Context
config>redundancy>multi-chassis>peer>mc-ipsec
Description
This command specifies the time interval of tunnel-group stays in “Discovery” state. Interval-1 is used as discovery-interval when a new tunnel-group is added to multi-chassis redundancy (mp-ipsec); interval-2 is used as discovery-interval when system boot-up, it is optional, when it is not specified, the interval-1 will be used.
Default
300
Parameters
interval-secs
Specifies the maximum duration, in seconds, of the discovery interval during which a newly activated multi- chassis IPsec tunnel-group will remain dormant while trying to contact its redundant peer. Groups held dormant in this manner will neither pass traffic nor negotiate security keys. This interval ends when either the redundant peer is contacted and a master election occurs, or when the maximum duration expires.
Values
boot interval-secs
Specifies the maximum duration of an interval immediately following system boot up. When the normal discovery interval for a group would expire while the post-boot discovery interval is still active, then the group's discovery interval is extended until the post-boot discovery interval expires. This allows an extension to the normal discovery stage of groups following a chassis reboot, to account for the larger variance in routing
hold-on-neighbor-failure
Syntax
hold-on-neighbor-failure multiplier
no hold-on-neighbor-failure
Context
config>redundancy>multi-chassis>peer>mc-ipsec
Description
This command specifies the number of keep-alive failure before consider the peer is down.
The no form of the command reverts to the default.
Default
3
Parameters
multiplier
Specifies the hold time applied on neighbor failure
Values
keep-alive-interval
Syntax
keep-alive-interval interval
no keep-alive-interval
Context
config>redundancy>multi-chassis>peer>mc-ipsec
Description
This command specifies the time interval of mastership election protocol sending keep-alive packet.
The no form of the command reverts to the default.
Default
10
Parameters
interval
Specifies the keep alive interval in tenths of seconds.
Values
tunnel-group
Syntax
tunnel-group tunnel-group-id [create]
no tunnel-group tunnel-group-id
Context
config>redundancy>multi-chassis>peer>mc-ipsec
Description
This command enables multi-chassis redundancy for specified tunnel-group; or enters an already configured tunnel-group context. The configured tunnel-group could failover independently.
The no form of the command removes the tunnel group ID from the configuration.
Default
none
Parameters
tunnel-group-id
Specifies the tunnel-group identifier.
Values
peer-group
Syntax
peer-group tunnel-group-id
no peer-group
Context
Description
This command specifies the corresponding tunnel-group id on peer node. The peer tunnel-group id does not necessary equals to local tunnel-group id.
The no form of the command removes the tunnel group ID from the configuration.
Default
none
Parameters
tunnel-group-id
Specifies the tunnel-group identifier.
Values
priority
Syntax
priority priority
no priority
Context
config>redundancy>multi-chassis>peer>mc-ipsec>tunnel-group
Description
This command specifies the local priority of the tunnel-group, this is used to elect master, higher number win. If priority are same, then the peer has more active ISA win; and priority and the number of active ISA are same, then the peer with higher IP address win.
The no form of the command removes the priority value from the configuration.
Default
100
Parameters
priority
Specifies the priority of this tunnel-group.
Values
protocol
Syntax
protocol {protocol} [all | instance instance]
no protocol
Context
config>router>policy-options>policy-statement>entry>to
Description
This command configures a routing protocol as a match criterion for a route policy statement entry. This command is used for both import and export policies depending how it is used.
When the ipsec is specified this means IPSecroutes.
If no protocol criterion is specified, any protocol is considered a match.
The no form of the command removes the protocol match criterion.
Default
no protocol — Matches any protocol.
Parameters
protocol
The protocol name to match on.
Values
instance
The OSPF or IS-IS instance.
Values
all
OSPF- or ISIS-only keyword.
state
Syntax
state state
no state
Context
config>router>policy-options>policy-statement>entry>from
Description
This command will configure a match criteria on the state attribute. The state attribute carries the state of an SRRP instance and it can be applied to:
Based on the state attribute of the route we can manipulate the route advertisement into the network.
We can enable or disable (in case there is no SRRP running) tracking of SRRP state by routes.
This is done on a per subscriber-interface route basis, where a subscriber-interface route is tracking a single SRRP instance state (SRRP instance might be in a Fate Sharing Group).
For subscriber-management and managed-routes, tracking is enabled per group interface under which SRRP is enabled.
Default
none
Description
This command specifies a multicast data source address as a match criterion for this entry.
Parameters
srrp-master
Track routes with the state attribute carrying srrp-master state.
srrp-non-master
Track routes with the state attribute carrying srrp-non-master state.
ipsec-master-with-peer
Track routes with the state attribute carrying ipsec-master-with-peer state.
ipsec-non-master
Track routes with the state attribute carrying ipsec-non-master state.
ipsec-master-without-peer
Track routes with the state attribute carrying ipsec-master-without-peer state.
tunnel-group
Syntax
tunnel-group tunnel-group-id sync-tag tag-name [create]
no tunnel-group
Context
config>redundancy>multi-chassis>peer>sync
Description
This command enables multi-chassis synchronization of IPsec states of specified tunnel-group with peer. sync-tag is used to match corresponding tunnel-group on both peers. IPsec states will be synchronized between tunnel-group with same sync-tag.
Default
no
Parameters
tunnel-group-id
Specifies the id of the tunnel-group
tag-name
Specifies the name of the sync-tag.
ipsec
Syntax
[no] ipsec
Context
config>redundancy>multi-chassis>peer>sync
Description
This command enables multi-chassis synchronization of IPsec states on system level.
Default
no
ipsec-responder-only
Syntax
[no] ipsec-responder-only
Context
config>isa>tunnel-group
Description
With this command configured, system will only act as IKE responder except for the automatic CHILD_SA rekey upon MC-IPsec switchover.
Default
no
IPSec RADIUS Commands
radius-accounting-policy
Syntax
radius-accounting-policy name [create]
no radius-accounting-policy name
Context
config>ipsec
Description
This command specifies an existing RADIUS accounting policy to use to collect accounting statistics on this subscriber profile by RADIUS. This command is used independently of the collect-stats command.
Parameters
name
Specifies an existing RADIUS based accounting policy.
radius-authentication-policy
Syntax
radius-authentication-policy name [create]
no radius-authentication-policy name
Context
config>ipsec
Description
This command specifies the radius authentication policy associated with this IPsec gateway.
include-radius-attribute
Syntax
[no] include-radius-attribute
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the context to specify the RADIUS parameters that the system should include into RADIUS authentication-request messages.
called-station-id
Syntax
[no] called-station-id
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command includes called station id attributes.
The no form of the command excludes called station id attributes.
calling-station-id
Syntax
[no] calling-station-id
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the inclusion of the calling-station-id attribute in RADIUS authentication requests and RADIUS accounting messages.
Default
no calling-station-id
framed-ip-addr
Syntax
[no] framed-ip-addr
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the inclusion of the framed-ip-addr attribute.
nas-identifier
Syntax
[no] nas-identifier
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the generation of the nas-identifier RADIUS attribute.
nas-ip-addr
Syntax
[no] nas-ip-addr
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the generation of the NAS ip-address attribute.
nas-port-id
Syntax
[no] nas-port-id
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command enables the generation of the nas-port-id RADIUS attribute. Optionally, the value of this attribute (the SAP-id) can be prefixed by a fixed string and suffixed by the circuit-id or the remote-id of the client connection. If a suffix is configured, but no corresponding data is available, the suffix used will be 0/0/0/0/0/0.
radius-server-policy
Syntax
radius-server-policy radius-server-policy-name
no radius-server-policy
Context
config>ipsec>rad-acct-plcy>include
config>ipsec>rad-auth-plcy>include
Description
This command references an existing radius-server-policy (available under the config>aaa context) for use in subscriber management authentication and accounting.
When configured in an authentication-policy, following CLI commands are ignored in the policy to avoid conflicts:
When configured in a radius-accounting-policy, following CLI commands are ignored in the policy to avoid conflicts:
The no form of the command removes the radius-server-policy reference from the configuration
Default
no radius-server-policy
Parameters
radius-server-policy-name
Specifies the RADIUS server policy.
update-interval
Syntax
update-interval minutes [jitter seconds]
no update-interval
Context
config>ipsec>rad-acct-plcy
Description
This command enables the system to send RADIUS interim-update packets for IKEv2 remote-access tunnels. The RADIUS attributes in the interim-update packet are the as same as acct-start. The value of the Acct-status-type in the interim-update message is 3.
Default
none
Parameters
minutes
Specifies the interval in minutes.
Values
seconds
Specifies the jitter as the number of seconds when thesystem sends each interim-update packet.
Values
password
Syntax
password password [hash|hash2]
no password
Context
config>ipsec>rad-auth-plcy>include
Description
This command specifies the password that is used in the RADIUS access requests.It shall be specified as a string of up to 32 characters in length.
The no form of the command resets the password to its default of ALU and will be stored using hash/hash2 encryption.
Default
ALU
Parameters
password
Specifies a password string up to 32 characters in length.
hash
Specifies the key is entered in an encrypted form. If the hash parameter is not used, the key is assumed to be in a non-encrypted, clear text form. For security, all keys are stored in encrypted form in the configuration file with the hash parameter specified.
hash2
Specifies the key is entered in a more complex encrypted form. If the hash2 parameter is not used, the less encrypted hash form is assumed.
 
CMPv2 Commands
pki
Syntax
pki
Context
config>system>security
Description
This command enables the context to configure PKI related parameters.
Default
none
ca-profile
Syntax
ca-profile name [create]
no ca-profile name
Context
config>system>security>pki
Description
This command creates a new ca-profile or enter the configuration context of an existing ca-profile. Up to 128 ca-profiles could be created in the system. A shutdown the ca-profile will not affect the current up and running ipsec-tunnel or ipsec-gw that associated with the ca-profile. But authentication afterwards will fail with a shutdown ca-profile.
Executing a no shutdown command in this context will cause system to reload the configured cert-file and crl-file.
A ca-profile can be applied under the ipsec-tunnel or ipsec-gw configuration.
The no form of the command removes the name parameter from the configuration. A ca-profile can not be removed until all the association(ipsec-tunnel/gw) have been removed.
Parameters
name
Specifies the name of the ca-profile, a string up to 32 characters.
create
Keyword used to create a new ca-profile. The create keyword requirement can be enabled/disabled in the environment>create context.
certificate
Syntax
certificate
Context
admin
Description
This command enables the context to configure X.509 certificate related operational parameters.
certificate-display-format
Syntax
certificate-display-format {ascii|utf8}
Context
config>system>security>pki
Description
This command specifies the certificate subject display format.
Default
ascii
Parameters
ascii
Use ascii encoding.
utf8
Use utf8 encoding.
cmpv2
Syntax
cmpv2
Context
admin>certificate
config>system>security>pki>ca-profile
Description
This command enables the context to configure CMPv2 parameters. Changes are not allowed when the CA profile is enabled (no shutdown).
accept-unprotected-errormsg
Syntax
[no] accept-unprotected-errormsg
Context
config>system>security>pki>ca-profile>cmpv2
Description
This command enables the system to accept both protected and unprotected CMPv2 error message. Without this command, system will only accept protected error messages.
The no form of the command causes the system to only accept protected PKI confirmation message.
Default
no
accept-unprotected-pkiconf
Syntax
[no] accept-unprotected-pkiconf
Context
config>system>security>pki>ca-profile>cmpv2
Description
This command enables the system to accept both protected and unprotected CMPv2 PKI confirmation messages. Without this command, system will only accept protected PKI confirmation message.
The no form of the command causes the system to only accept protected PKI confirmation message.
Default
none
always-set-sender-for-ir
Syntax
[no] always-set-sender-for-ir
Context
config>system>security>pki>ca-profile>cmpv2
Description
This command specifies to always set the sender field in CMPv2 header of all Initial Registration (IR) messages with the subject name. By default, the sender field is only set if an optional certificate is specified in the CMPv2 request.
Default
no always-set-sender-for-ir
key-list
Syntax
cmp-key-list
Context
config>system>security>pki>ca-profile>cmp2
Description
This command enables the context to configure pre-shared key list parameters.
key
Syntax
key password [hash|hash2] reference reference-number
no key reference reference-number
Context
config>system>security>pki>ca-profile>cmp2>key-list
Description
This command specifies a pre-shared key used for CMPv2 initial registration. Multiples of key commands are allowed to be configured under this context.
The password and reference-number is distributed by the CA via out-of-band means.
The configured password is stored in configuration file in an encrypted form by using SR OS hash2 algorithm.
The no form of the command removes the parameters from the configuration.
Default
none
Parameters
password
Specifies a printable ASCII string, up to 64 characters in length.
hash
Specifies that the given password is already hashed using hashing algorithm version 1. A semantic check is performed on the given password field to verify if it is a valid hash 1 key to store in the database.
hash2
Specifies that the given password is already hashed using hashing algorithm version 2. A semantic check is performed on the given password field to verify if it is a valid hash 2 key to store in the database.
reference reference-number
Specifies a printable ASCII string, up to 64 characters in length.
 
url
Syntax
cmp-url url-string [service-id service-id]
no cmp-url
Context
config>system>security>pki>ca-profile>cmp2
Description
This command specifies HTTP URL of the CMPv2 server. The URL must be unique across all configured ca-profiles.
The URL will be resolved by the DNS server configured (if configured) in the corresponding router context.
If the service-id is 0 or omitted, then system will try to resolve the FQDN via DNS server configured in bof.cfg. After resolution, the system will connect to the address in management routing instance first, then base routing instance.
Note that if the service is VPRN, then the system only allows HTTP ports 80 and 8080.
Default
none
Parameters
url-string
Specifies the HTTP URL of the CMPv2 server up to 180 characters in length.
service-id service-id
Specifies the service instance that used to reach CMPv2 server.
Values
revocation-check
Syntax
revocation-check {crl | crl-optional}
Context
config>system>security>pki>ca-profile
Description
This command specifies the revocation method system used to check the revocation status of certificate issued by the CA, the default value is crl, which will use CRL. But if it is crl-optional, then it means when the user disables the ca-profile, then the system will try to load the configured CRL (specified by the crl-file command). But if the system fails to load it for following reasons, then the system will still bring ca-profile oper-up, but leave the CRL as non-exist.
If the system needs to use the CRL of a specific ca-profile to check the revocation status of an end-entity cert, and the CRL is non-existent due to the above reasons, then the system will treat it as being unable to get an answer from CRL and fall back to the next status-verify method or default-result.
If the system needs to check the revocation of a CA cert in cert chain, and if the CRL is non-existent due to the above reasons, then the system will skip checking the revocation status of the CA cert. For example, if CA1 is issued by CA2, if CA2’s revocation-check is crl-optional and the CA2’s CRL is non-existent, then the system will not check CA1 cert’s revocation status and consider it as “good”.
Note that users must shutdown the ca-profile to change the revocation-check configuration.
Default
revocation-check crl
Parameters
crl
Specifies to use the configured CRL.
crl-optional
Specifies that the CRL is optional.
http-response-timeout
Syntax
http-response-timeout timeout
no http-response-timeout
Context
config>system>security>pki>ca-profile>cmp2
Description
This command specifies the timeout value for HTTP response that is used by CMPv2.
The no form of the command reverts to the default.
Default
30 seconds
Parameters
timeout
Specifies the HTTP response timeout in seconds.
Values
http-version
Syntax
http-version [1.0|1.1]
Context
config>system>security>pki>ca-profile>cmp2
Description
This command configures the the HTTP version for CMPv2 messages.
Default
1.1
response-signing-cert
Syntax
response-signing-cert filename
no response-signing-cert
Context
config>system>security>pki>ca-profile>cmp2
Description
This command specifies a imported certificate that is used to verify the CMP response message if they are protected by signature. If this command is not configured, then CA’s certificate will be used.
Default
none
Parameters
filename
Specifies the filename of the imported certificate.
 
same-recipnonce-for-pollreq
Syntax
[no] same-recipnonce-for-pollreq
Context
config>system>security>pki>ca-profile>cmp2
Description
This command enables the system to use same recipNonce as the last CMPv2 response for poll request.
Default
none
cert-request
Syntax
cert-request ca ca-profile-name current-key key-filename current-cert cert-filename [hash-alg hash-algorithm] newkey key-filename subject-dn subject-dn [domain-name <[255 chars max]> [ip-addr <ip-address|ipv6-address>] save-as save-path-of-result-cert
Context
admin>certificate>cmpv2
Description
This command requests an additional certificate after the system has obtained the initial certificate from the CA.
The request is authenticated by a signature signed by the current-key, along with the current-cert. The hash algorithm used for signature is depends on the key type:
In some cases, the CA may not return a certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.
Default
none
Parameters
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
current-key key-filename
Specifies corresponding certificate issued by the CA up to 95 characters in max.
current-cert cert-filename
Specifies the file name of an imported certificate that is attached to the certificate request up to 95 characters in max.
newkey key-filename
Specifies the file name of the imported key up to 95 characters in max..
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values
subject-dn dn
Specifies the subject of the requesting certificate up to 256 chars max.
Values
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.
domain-name
Specifies a FQDN for SubjectAltName of the requesting certificate up to 255 characters in length.
ip-addr <ip-address|ipv6-address>
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.
clear-request
Syntax
clear-request ca ca-profile-name
Context
admin>certificate>cmpv2
Description
This command clears current pending CMPv2 requests toward the specified CA. If there are no pending requests, it will clear the saved result of prior request.
Default
none
Parameters
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max.
initial-registration
Syntax
initial-registration ca ca-profile-name key-to-certify key-filename protection-alg {password password reference ref-number | signature [cert cert-file-name [send-chain [with-ca ca-profile-name]]] [protection-key key-file-name] [hash-alg {md5 | sha1 | sha224 | sha256 | sha384 | sha512}]} subject-dn dn [domain-name <[255 chars max]> [ip-addr <ip-address|ipv6-address>] save-as save-path-of-result-cert
Context
admin>certificate>cmpv2
Description
This command request initial certificate from CA by using CMPv2 initial registration procedure.
The ca parameter specifies a CA-profile which includes CMP server information.
The key-to-certify is an imported key file to be certified by the CA.
The protection-key is an imported key file used to for message protection if protection-alg is signature.
The request is authenticated either of following methods:
The specified password and reference number are not necessarily in the cmp-keylist configured in the corresponding CA-Profile
DSA key: SHA1
RSA key: MD5/SHA1/SHA224|SHA256|SHA384|SHA512, by default is SHA1
Optionally, the system could also send a certificate or a chain of certificates in extraCerts field. Certificate is specified by the “cert” parameter, it must include the public key of the key used for message protection.
Sending a chain is enabled by specify the send-chain parameter.
subject-dn specifies the subject of the requesting certificate.
save-as specifies full path name of saving the result certificate.
In some cases, CA may not return certificate immediately, due to reason like request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command could be used to poll the status of the request. If key-list is not configured in the corresponding ca-profile, then the system will use the existing password to authenticate the CMPv2 packets from server if it is in password protection.
If key-list is configured in the corresponding ca-profile and server doesn't send SenderKID, then the system will use lexicographical first key in the key-list to authenticate the CMPv2 packets from server in case it is in password protection.
Default
none
Parameters
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
key-to-certify key-filename
Specifies the file name of the key to certify up to 95 characters max.
password password
Specifies an ASCII string up to 64 characters in length.
reference ref-number
Specifies the reference number for this CA initial authentication key up to 64 characters max.
cert cert-file-name
specifies the certificate file up to 95 characters max.
send-chain with-ca ca-profile-name
Specifies to send the chain.
protection-key key-file-name
Specifies the protection key associated with the action on the CA profile.
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values
subject-dn dn
Specifies the subject of the requesting certificate up to 256 chars max.
Values
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.
domain-name
Specifies a FQDN for SubjectAltName of the requesting certificate up to 255 characters in length.
ip-addr <ip-address|ipv6-address>
Specifies an IPv4 or IPv6 address for SubjectAtName of the requesting certificate.
key-update
Syntax
key-update ca ca-profile-name newkey key-filename oldkey key-filename oldcert cert-filename [hash-alg hash-algorithm] save-as save-path-of-result-cert
Context
admin>certificate>cmpv2
Description
This command requests a new certificate from the CA to update an existing certificate due to reasons such as key refresh or replacing compromised key.
In some cases, the CA may not return certificate immediately, due to reasons such as request processing need manual intervention. In such cases, the admin certificate cmpv2 poll command can be used to poll the status of the request.
Parameters
ca ca-profile-name
Specifies a ca-profile name which includes CMP server information up to 32 characters max.
newkey key-filename
Specifies the key file of the requesting certificate up to 95 characters max.
oldkey key-filename
Specifies the key to be replaced up to 95 characters max.
oldcert cert-filename
Specifies the file name of an imported certificate to be replaced up to 95 characters max
hash-alg hash-algorithm
Specifies the hash algorithm for RSA key.
Values
save-as save-path-of-result-cert
Specifies the save full path name of saving the result certificate up to 200 characters max.
poll
Syntax
poll ca ca-profile-name
Context
admin>certificate>cmpv2
Description
This command polls the status of the pending CMPv2 request toward the specified CA.
If the response is ready, this command will resume the CMPv2 protocol exchange with server as the original command would do. The requests could be also still be pending as a result, then this command could be used again to poll the status.
SR OS allows only one pending CMP request per CA, which means no new request is allowed when a pending request is present.
Default
none
Parameters
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max.
show-request
Syntax
show-request [ca ca-profile-name]
Context
admin>certificate>cmpv2
Description
This command displays current the CMPv2 pending request toward the specified CA. If there is no pending request, the last pending request is displayed including the status (success/fail/rejected) and the receive time of last CMPv2 message from server.
The following information is included in the output:
Request type, original input parameter(password is not displayed), checkAfter and reason in of last PollRepContent, time of original command input.
Default
none
Parameters
ca ca-profile-name
Specifies a ca-profile name up to 32 characters max. If not specified, the system will display pending requests of all ca-profiles.
 
Auto-Update Command Descriptions
file-transmission-profile
Syntax
file-transmission-profile name [create]
no file-transmission-profile name
Context
config>system
Description
This command creates a new file transmission profile or enters the configuration context of an existing file-transmission-profile.
The file-transmission-profile context defines transport parameters for protocol such as HTTP, include routing instance, source address, timeout value, etc.
Default
n/a
Parameters
name
Specifies the file-transmission-profile name, up to 32 characters. in length.
ipv4-source-address
Syntax
ipv4-source-address ip-address
no ipv4-source-address
Context
config>system>file-trans-prof
Description
This command specifies the IPv4 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of the egress interface.
Default
no ipv4-source-address
Parameters
ip-address
Specifies a unicast v4 address. This should be a local interface address.
ipv6-source-address
Syntax
ipv6-source-address ipv6-address
no ipv6-source-address
Context
config>system>file-trans-prof
Description
This command specifies the IPv6 source address used for transport protocol.
The no form of this command uses the default source address which typically is the address of egress interface.
Default
no ipv6-source-address
Parameters
Ipv6-address
Specifies a unicast v6 address. This should be a local interface address.
redirection
Syntax
redirection level
no redirection
Context
config>system>file-trans-prof
Description
This command enables system to accept HTTP redirection response, along with the max level of redirection. The virtual router may send a new request to another server if the requested resources are not available (e.g., temporarily available to another server).
Default
no redirection
Parameters
level
Specifies the maximum level of redirection of the file transmission profile. max level of HTTP redirection.
Values
retry
Syntax
retry count
no retry
Context
config>system>file-trans-prof
Description
This command specifies the number of retries on transport protocol level.
When the virtual router does not receive any data from a server (e.g., FTP or HTTP server) after the configured timeout seconds, the router may repeat the request to the server. The number of retries specifies the maximum number of repeated requests.
The no form of this command disables the retry.
Default
no retry
Parameters
count
Specifies the number of retries.
Values
router
Syntax
router router-instance
Context
config>system>file-trans-prof
Description
This command specifies the routing instance that the transport protocol uses.
Default
router "Base"
Parameters
router-instance
Specifies the router instance on which the file transmission connection will be established.
Values
<router-instance> :<router-name>|<service-id>
router-name "Base"|"management"|"vpls-management"
service-id [1..2147483647]
timeout
Syntax
timeout seconds
Context
config>system>file-trans-prof
Description
This command specifies timeout value in seconds for transport protocol. The timeout is the maximum waiting time to receive any data from the server (e.g., FTP or HTTP server).
Default
60
Parameters
seconds
Specifies the connection timeout (in seconds) for the file transmission.
Values
auto-crl-update
Syntax
auto-crl-update [create]
no auto-crl-update
Context
config>system>security>pki>ca-prof
Description
This command creates an auto CRL update configuration context with the create parameter, or enters the auto-crl-update configuration context without the create parameter.
This mechanism auto downloads a CRL file from a list of configured HTTP URLs either periodically or before existing CRL expires. If the downloaded CRL is more recent than the existing one, then the existing one will be replaced.
Note: The configured URL must point to a DER encoded CRL file.
Default
no auto-crl-update
Parameters
create
Creates an auto CRL update for the ca-profile.
crl-urls
Syntax
crl-urls
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command enables the context to configure crl-urls parameters. The system allows up to eight URL entries to be configured and will try each URL in order and stop when a qualified CRL is successfully downloaded. A qualified CRL is a valid CRL signed by the CA and is more recent than the existing CRL.
If none of the configured URLs returns a qualified CRL, then:
If the user wants to manually stop the download, shutting down of auto-crl-retrieval could be used to achieve this.
Default
n/a
url-entry
Syntax
url-entry entry-id [create]
no url-entry entry-id
Context
config>system>security>pki>ca-prof>auto-crl-update>crl-urls
This command creates a new crl-url entry with the create parameter, or enters an existing url-entry configuration context without create parameter.
The no form of this command removes the specified entry.
Default
n/a
Parameters
entry-id
Specifies a URL configured on this system.
Values
Parameters
create
Creates an auto URL entry.
file-transmission-profile
Syntax
file-transmission-profile profile-name
no file-transmission-profile
Context
config>system>security>pki>ca-prof>auto-crl-update>crl-urls> url-entry
Description
This command specifies the file-transmission-profile for the url-entry. When the system downloads a CRL from the configured URL in the url-entry it will use the transportation parameter configured in the file-transmission-profile. auto-crl-update supports Base/Management/VPRN routing instance. vpls-management is not supported. In case of VPRN, the HTTP server port can only be 80 or 8080.
The no form of the command removes the specified profile name.
Default
n/a
Parameters
profile-name
Specifies the name of the file transmission profile to be matched up to 32 characters in length. The file-transmission-profile name is configured under config>system>file-transmission-profile.
 
 
url
Syntax
url url
no url
Context
config>system>security>pki>ca-prof>auto-crl-update>crl-urls> url-entry
Description
This command specifies the HTTP URL of the CRL file for the url-entry. The system supports both IPv4 and IPv6 HTTP connections.
Note that the URL must point to a DER encoded CRL.
Default
n/a
Parameters
url
Specifies the URL, which specifies the location, where an updated CRL can be downloaded from.
periodic-update-interval
Syntax
periodic-update-interval [days days] [hrs hours] [min minutes] [sec seconds]
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command specifies the interval for periodic updates. The minimal interval is 1 hour. The maximum interval is 366 days.
Default
days 1
Parameters
days days
Specifies the number of days for periodic updates.
Values
hrs hours
Specifies the number of hours for periodic updates.
Values
min minutes
Specifies the number of minutes for periodic updates.
Values
sec seconds
Specifies the number of seconds for periodic updates.
Values
retry-interval
Syntax
retry-interval seconds
no retry-interval
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command specifies the interval, in seconds, that the system waits before retrying the configured url-entry list when schedule-type is next-update-based and none of the URLs return a qualified CRL.
The no form of the command causes the system to retry immediately without waiting.
Default
3600
Parameters
seconds
Specifies an interval, in seconds, before retrying to update the CRL.
Values
pre-update-time
Syntax
pre-update-time [days days] [hrs hours] [min minutes] [sec seconds]
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command specifies the pre-download time for next-update-based update.
Default
hrs 1
Parameters
days days
Specifies the time period, in days, prior to the next update time of the current CRL.
Values
hrs hours
Specifies the time period, in hours, prior to the next update time of the current CRL.
Values
min minutes
Specifies the time period, in minutes, prior to the next update time of the current CRL.
Values
sec seconds
Specifies the time period, in seconds, prior to the next update time of the current CRL.
Values
schedule-type
Syntax
schedule-type schedule-type
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command specifies the schedule type for auto CRL update. The system supports two types:
periodic: — The system will download a CRL periodically at the interval configured via the periodic-update-interval command. For example, if the periodic-update-interval is 1 day, then the system will download a CRL every 1 day. The minimal periodic-update-interval is 1 hour.
ext-update-based — The system will download a CRL at the time = Next_Update_of_existing_CRL minus pre-update-time. For example, if the Nex-Update of the existing CRL is 2015-06-30 06:00 and pre-update-time is 1 hour, then the system will start downloading at 2015-06-30, 05:00.
Default
next-update-based
Parameters
schedule-type
Specifies the type of time scheduler to update the CRL.
Values
shutdown
Syntax
[no] shutdown
Context
config>system>security>pki>ca-prof>auto-crl-update
Description
This command disables the auto CRL update.
The no form of this command enables an auto CRL update. Upon no shutdown, if the configured CRL file does not exist, is invalid or is expired or if the schedule-type is next-update-based and current time passed (Next-Update_of_existing_CRL - pre-update-time), then system will start downloading CRL right away.
Default
shutdown
crl-update
Syntax
crl-update ca ca-profile-name
Context
admin>certificate
Description
This command manually triggers the CRL update for the specified ca-profile.
Using this command requires shutting down the auto-crl-update.
Default
none
Parameters
ca-profile-name
Specifies the name of the Certificate Authority profile.
 
Show Commands
cert-profile
Syntax
cert-profile name association
cert-profile [name]
cert-profile name entry [1..8]
Description
This command displays IPsec certificate profile information.
name
Specifies an existing cert-profile name.
association
Displays information for which this IPSec certificate profile is associated.
entry [1..8]
Displays information for the specified entry.
Sample Output
*A:Dut-A# show ipsec cert-profile cert "cert-1.der" 
==============================================================================
Certificate Profile Entry 
==============================================================================
Id Cert                     Key                      Status Flags
------------------------------------------------------------------------------
1  cert-1.der               key-1.der                
==============================================================================
*A:Dut-A# 
 
 
*A:Dut-A# show ipsec cert-profile "cert-1.der" entry 1
===============================================================================
IPsec Certificate Profile: cert-1.der Entry: 1 Detail
===============================================================================
Cert File        : cert-1.der
Key File         : key-1.der
Status Flags     : (Not Specified)
Comp Chain       : complete             
 
Compute Chain CA Profiles
-------------------------------------------------------------------------------
CA10
CA9
CA8
CA7
CA6
===============================================================================
*A:Dut-A# exit 
 
 
 
certificate
Syntax
certificate filename association
Context
show>ipsec
Description
This command displays certificate-related information.
Parameters
filename
Specifies the certificate file name.
association
Displays information for which this IPSec certificate is associated.
Sample Output
*A:Dut-B# show certificate ca-profile   
-------------------------------------------------------------------------------
Max Cert Chain Depth: 7 (default)
-------------------------------------------------------------------------------
Certificate Display Format: 1 ASCII
===============================================================================
CA Profile
===============================================================================
CA Profile        Admin Oper  Cert File                CRL File
                  State State                          
-------------------------------------------------------------------------------
CA0               up    up    CA1-00cert.der           CA1-00crl.der
CA1               up    up    CA1-01cert.der           CA1-01crl.der
CA2               up    up    CA1-02cert.der           CA1-02crl.der
CA3               up    up    CA1-03cert.der           CA1-03crl.der
CA4               up    up    CA1-04cert.der           CA1-04crl.der
CA5               up    up    rsa_sha512_1024_0cert.d* rsa_sha512_1024_0crl.der
CA6               up    up    rsa_sha512_1024_1cert.d* rsa_sha512_1024_1crl.der
CA7               up    up    rsa_sha512_1024_2cert.d* rsa_sha512_1024_2crl.der
CA8               up    up    rsa_sha512_1024_3cert.d* rsa_sha512_1024_3crl.der
CA9               up    up    rsa_sha512_1024_4cert.d* rsa_sha512_1024_4crl.der
CA10              up    up    rsa_sha512_1024_5cert.d* rsa_sha512_1024_5crl.der
CA11              up    up    rsa_sha384_1024_0cert.d* rsa_sha384_1024_0crl.der
CA12              up    up    rsa_sha384_1024_1cert.d* rsa_sha384_1024_1crl.der
CA13              up    up    rsa_sha384_1024_2cert.d* rsa_sha384_1024_2crl.der
CA14              up    up    rsa_sha384_1024_3cert.d* rsa_sha384_1024_3crl.der
CA15              up    up    rsa_sha384_1024_4cert.d* rsa_sha384_1024_4crl.der
CA16              up    up    rsa_sha384_1024_5cert.d* rsa_sha384_1024_5crl.der
CMPv2             up    up    rsaCMPv2cert.der         rsaCMPv2CRL.der
-------------------------------------------------------------------------------
Entries found: 18
===============================================================================
* indicates that the corresponding row element may have been truncated.
*A:Dut-B# 
 
 
*A:Dut-B# show ipsec certificate cert-1.der association 
===============================================================================
Associated Tunnels
===============================================================================
Tunnel                        SvcId       Sap                           Admin
-------------------------------------------------------------------------------
tun-1-s-cert-v2               3           tunnel-1.private:3            Up
tun-1-s-cert-MTA-v2           8           tunnel-1.private:7            Up
tun-1-s-cert-i_op-ss-v2       42          tunnel-1.private:10           Up
tun-1-s-cert-MTA-i_op-ss-v2   48          tunnel-1.private:11           Up
-------------------------------------------------------------------------------
IPsec Tunnels: 4
===============================================================================
*A:Dut-B# 
 
 
Note that in the following example, the "cert-1.der" is the certificate-profile name, where as above the cert-1.der is the actual file in use.
*A:Dut-B# show ipsec cert-profile association "cert-1.der" 
===============================================================================
IPsec tunnels using certificate profile
===============================================================================
SvcId      Type   SAP                          Tunnel
-------------------------------------------------------------------------------
3          vprn   tunnel-1.private:3           tun-1-s-cert-v2
8          vprn   tunnel-1.private:7           tun-1-s-cert-MTA-v2
42         vprn   tunnel-1.private:10          tun-1-s-cert-i_op-ss-v2
48         vprn   tunnel-1.private:11          tun-1-s-cert-MTA-i_op-ss-v2
===============================================================================
Number of tunnel entries: 4
===============================================================================
===============================================================================
IPsec gateways using certificate profile
===============================================================================
SvcId      Type   SAP                          Gateway
-------------------------------------------------------------------------------
1057       vprn   tunnel-1.public:18           d-cert-MTA-g1-1-v2
1092       vprn   tunnel-1.public:21           d-cert-i_op-ss-g1-1-v2
===============================================================================
Number of gateway entries: 2
===============================================================================
*A:Dut-B# 
 
gateway
Syntax
gateway name name
gateway [service service-id]
gateway tunnel [ip-address:port]
gateway name name tunnel ip-address:port
gateway name name tunnel
gateway [name name] tunnel state state
gateway [name name] tunnel idi-value idi-prefix
gateway tunnel count
Context
show>ipsec
Description
This command displays IPSec gateway information.
Parameters
name name
Specifies an IPSec gateway name.
service service-id
specifies the service ID of the default security service used by the IPSec gateway.
Values
tunnel ip-address:port
Specifies to display the IP address and UDP port of the SAP IPSec gateway to the tunnel.
Values
state state
Specifies the state of the tunnel, up or down.
idi-value idi-prefix
Specifies a string as an IDi prefix. With this parameter, the system will list all peer’s with IDi that has specified prefixes.
count
Specifies to display the number of IPSec gateway tunnels with the ike-policy>auth-method command set to psk.
Sample Output
show ipsec gateway 
===============================================================================
IPSec Gateway 
===============================================================================
Name                             LclGwAddr        Adm  Opr  Ike  Auth
 SAP                              Service                        
-------------------------------------------------------------------------------
rw                               172.16.100.1     Up   Up   2    certRadius
 tunnel-1.public:100              300                             
-------------------------------------------------------------------------------
Number of gateways: 1
===============================================================================
 
 
show ipsec gateway name "rw" 
===============================================================================
IPSec Gateway (SAP)
===============================================================================
-------------------------------------------------------------------------------
IPSec Gateway ( rw )
-------------------------------------------------------------------------------
Sap                : tunnel-1.public:100      Service           : 300
Local GW           : 172.16.100.1
Admin State        : Up                       Oper State        : Up
Def Secure Svc     : 400                      
Def Secure Svc If  : priv
Ike Policy Id      : 2                        
Ike Version        : 2                        Ike Policy Auth   : certRadius
Pre Shared Key     : haha
X509 Cert          : (Not Specified)
Key                : (Not Specified)
Local Id Type      : fqdn                     
Local Id Value     : segwmobilelab.alu.com
Cert Profile       : segw-mlab
Trust Anchor Prof  : sc-root                  
Radius Acct Plcy   : rad-acct-policy-1
Radius Auth Plcy   : rad-auth-policy-1
TS-List            : <none>
                                      
Certificate Status Verify
-------------------------------------------------------------------------------
Primary            : crl                      Secondary         : none
Default Result     : good                     
-------------------------------------------------------------------------------
Template Id: 1
-------------------------------------------------------------------------------
Transform Id1      : 1                        Transform Id2     : None
Transform Id3      : None                     Transform Id4     : None
Reverse Route      : none                     Replay Window     : None
IP MTU             : max                      Encap IP MTU      : max
Pkt Too Big        : true                     Clear DF BIT      : false
Pkt Too Big Number : 100                      Pkt Too Big Intvl : 10 secs
===============================================================================
 
 
show ipsec gateway name "rw" tunnel 
===============================================================================
IPsec Remote User Tunnels
===============================================================================
Remote Endpoint Addr                    GW Name              
 GW Lcl Addr                            SvcId               TnlType
  Private Addr                          Secure SvcId        BiDirSA
   Idi-Type      Value*                                     
-------------------------------------------------------------------------------
11.0.0.100:500                          rw                  
 172.16.100.1                           300                 certRadius
 2001:beef::50                          400                 true
   derAsn1Dn      C=US,ST=CA,O=ALU,CN=Smallcell-1                             
-------------------------------------------------------------------------------
IPsec Gateway Tunnels: 1
===============================================================================
 
 
show ipsec gateway name "rw" tunnel 11.0.0.100 
===============================================================================
IPsec Remote Users Tunnel Detail
===============================================================================
-------------------------------------------------------------------------------
IP Addr: 11.0.0.100, port: 500
-------------------------------------------------------------------------------
Service Id       : 300                  Sap Id           : tunnel-1.public:100
Address          : 11.0.0.100
Private If       : priv
Private Address  : 2001:beef::50
Private Service  : 400                  Template Id      : 1
Replay Window    : None                 Bi Direction SA  : true
Host MDA         : 1/2                  
Match TrustAnchor: smallcell-root       
Last Oper Changed: 12/05/2014 23:01:48  
IKE IDI Type     : derAsn1Dn            
IKE IDI Value    : C=US,ST=CA,O=ALU,CN=Smallcell-1
-------------------------------------------------------------------------------
Dynamic Keying Parameters
-------------------------------------------------------------------------------
Transform Id1    : 1                    Transform Id2    : None
Transform Id3    : None                 Transform Id4    : None
IPsec GW Name    : rw
Local GW Address : 172.16.100.1
Ike Policy Id    : 2                    Ike Pol Auth     : certRadius
Pre Shared Key   : haha
Cert Profile     : segw-mlab
Trust Anchor Prof: sc-root              
Selected Cert    : SeGW-MLAB.cert
Selected Key     : SeGW-MLAB.key
Send Chain Prof  : None
Local Id Type    : fqdn                 
Local Id Value   : segwmobilelab.alu.com
Radius Acct Plcy : rad-acct-policy-1
Radius Auth Plcy : rad-auth-policy-1
TS-List          : <none>
 
Certificate Status Verify
-------------------------------------------------------------------------------
Primary          : crl                  Secondary        : none
Default Result   : good 
-------------------------------------------------------------------------------
ISAKMP-SA
-------------------------------------------------------------------------------
State            : Up                   
Established      : 12/05/2014 23:01:49  Lifetime         : 86400
Expires          : 12/06/2014 23:01:49  
 
ISAKMP Statistics
--------------------
Tx Packets       : 2                    Rx Packets       : 2
Tx Errors        : 0                    Rx Errors        : 0
Tx DPD           : 0                    Rx DPD           : 0
Tx DPD ACK       : 0                    Rx DPD ACK       : 0
DPD Timeouts     : 0                    Rx DPD Errors    : 0
-------------------------------------------------------------------------------
IPsec-SA : 1, Inbound (index 2)
-------------------------------------------------------------------------------
SPI              : 203073               
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 12/05/2014 23:01:48  Lifetime         : 3600
Local Traffic Selectors:
2003:dead::1-2003:dead::1
Remote Traffic Selectors:
2001:beef::50-2001:beef::50
 
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
 
-------------------------------------------------------------------------------
IPsec-SA : 1, Outbound (index 1)
-------------------------------------------------------------------------------
SPI              : 3232561216           
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
Installed        : 12/05/2014 23:01:48  Lifetime         : 3600
Local Traffic Selectors:
2003:dead::1-2003:dead::1
Remote Traffic Selectors:
2001:beef::50-2001:beef::50
 
Aggregate Statistics
--------------------
Bytes Processed  : 0                    Packets Processed: 0
Crypto Errors    : 0                    Replay Errors    : 0
SA Errors        : 0                    Policy Errors    : 0
===============================================================================
Fragmentation Statistics
===============================================================================
Encapsulation Overhead                 : 73
Pre-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
Post-Encapsulation
    Fragmentation Count                : 0
    Last Fragmented Packet Size        : 0
===============================================================================
===============================================================================
 
tunnel
Syntax
tunnel [gre-tunnel-name]
Context
show>gre
Description
This command displays information about a particular GRE tunnel or all GRE tunnels.
Parameters
gre-tunnel-name
Specifies the name of a GRE tunnel.
The following table lists the information displayed for each GRE tunnel.
 
Sample Output
dut-A# show gre tunnel 
===============================================================================
GRE Tunnels
===============================================================================
TunnelName                       LocalAddress     SvcId       Admn             
 SapId                            RemoteAddress    DlvrySvcId  Oper            
  To                               Bkup RemAddr     DSCP        Oper Rem Addr  
-------------------------------------------------------------------------------
toce2                            50.1.1.7         500         Up              
 tunnel-1.private:1               30.1.1.3         500         Up             
  20.1.1.2                         30.1.2.7         None        30.1.1.3      
toce2_backup                     50.1.2.3         502         Up              
 tunnel-1.private:3               30.1.1.3         502         Up             
  20.1.2.2                         0.0.0.0          None        30.1.1.3      
-------------------------------------------------------------------------------
GRE Tunnels: 2
===============================================================================
 
A:Dut-A# show gre tunnel "toce2"  
 
===============================================================================
GRE Tunnel Configuration Detail
===============================================================================
Service Id       : 500                  Sap Id           : tunnel-1.private:1
Tunnel Name      : toce2
Description      : None
Target Address   : 20.1.1.2             Delivery Service : 500
Admin State      : Up                   Oper State       : Up
Source Address   : 50.1.1.7             Oper Remote Addr : 30.1.1.3
Remote Address   : 30.1.1.3             Backup Address   : 30.1.2.7
DSCP             : None                 
Oper Flags       : None
 
===============================================================================
GRE Tunnel Statistics: toce2
===============================================================================
Errors Rx        : 0                    Errors Tx        : 0
Pkts Rx          : 165342804            Pkts Tx          : 605753463
Bytes Rx         : 84986201256          Bytes Tx         : 296819196870
Key Ignored Rx   : 0                    Too Big Tx       : 0
Seq Ignored Rx   : 0                    
Vers Unsup. Rx   : 0                    
Invalid Chksum Rx: 0                    
Loops Rx         : 0                    
===============================================================================
===============================================================================
 
A:Dut-A# show gre tunnel count 
--------------------------------------------------------------------------------
GRE Tunnels: 2
--------------------------------------------------------------------------------
ike-policy
Syntax
ike-policy ike-policy-id
ike-policy
Context
show>ipsec
Description
This command displays
Parameters
ike-policy-id
Specifies the ID of an IKE policy entry.
Values
Sample Output
*A:ALA-48# show ipsec ike-policy 10
===============================================================================
IPsec IKE policy Configuration Detail
===============================================================================
Policy Id        : 10                   IKE Mode         : main
DH Group         : Group2               Auth Method      : psk
PFS              : False                PFS DH Group     : Group2
Auth Algorithm   : Sha1                 Encr Algorithm   : Aes128
ISAKMP Lifetime  : 86400                IPsec Lifetime   : 3600
NAT Traversal    : Disabled
NAT-T Keep Alive : 0                    Behind NAT Only  : True
DPD              : Disabled
DPD Interval     : 30                   DPD Max Retries  : 3
Description      : (Not Specified)
===============================================================================
*A:ALA-48#
radius-accounting-policy
Syntax
radius-accounting-policy [name]
Context
show>ipsec
Description
This command displays RADIUS accounting-policy related information.
Parameters
name
Specifies an existing RADIUS accounting policy.
Sample Output
show ipsec radius-accounting-policy 
===============================================================================
Radius Accounting Policy
===============================================================================
Policy Name                Server Policy              Include Attribs   Upd Int
                                                                         Jitter
-------------------------------------------------------------------------------
rad-acct-policy-1                                     nasId nasPortId   20
                                                      framedIpAddr      
                                                                         10
===============================================================================
Number of entries: 1
===============================================================================
 
 
show ipsec radius-accounting-policy "rad-acct-policy-1" 
===============================================================================
IPsec Radius Accounting Policy Detail
===============================================================================
Name             : rad-acct-policy-1
Server Policy    : (Not Specified)
Include Attr     : nasId nasPortId framedIpAddr
Update Interval  : 20
Jitter           : 10 sec.
===============================================================================
 
radius-authentication-policy
Syntax
radius-authentication-policy [name]
Context
show>ipsec
Description
This command displays IPSec RADIUS authentication policy information.
Parameters
name
Specifies an existing RADIUS authentication policy.
security-policy
Syntax
security-policy service-id [security-policy-id]
security-policy
Context
show>ipsec
Description
This command displays
Parameters
service-id
Specifies the service-id of the tunnel delivery service.
Values
security-policy-id
Specifies the IPSec security policy entry that this tunnel will use.
Values
Sample Output
*A:ALA-48>show>ipsec# security-policy 1
========================================================================
Security Policy Param Entries
========================================================================
SvcId      Security   Policy     LocalIp             RemoteIp
           PlcyId     ParamsId
------------------------------------------------------------------------
1          1          1          0.0.0.0/0           0.0.0.0/0
------------------------------------------------------------------------
No. of IPsec Security Policy Param Entries: 1
========================================================================
*A:ALA-48>show>ipsec#
static-sa
Syntax
static-sa
static-sa name sa-name
static-sa spi spi
Context
show>ipsec
Description
This command displays IPSec static-SA information.
Parameters
sa-name
Specifies the SA name.
Values
spi
Specifies the spi.
Values
transform
Syntax
transform [transform-id]
Context
show>ipsec
Description
This command displays IPSec transforms.
Parameters
transform-id
Specifies an IPSec transform entry.
Values
Sample Output
*A:ALA-48>config>ipsec# show ipsec transform 1
================================================================
IPsec Transforms
================================================================
TransformId    EspAuthAlgorithm    EspEncryptionAlgorithm
----------------------------------------------------------------
1              Sha1                Aes128
----------------------------------------------------------------
No. of IPsec Transforms: 1
================================================================
*A:ALA-48>config>ipsec#
 
trust-anchor-profile
Syntax
trust-anchor-profile [trust-anchor-profile] association
trust-anchor-profile [trust-anchor-profile]
Context
show>ipsec
Description
This command displays trust anchor profile information.
Parameters
trust-anchor-profile
Specifies the trust anchor profile name up to 32 characters in length.
association
Displays information for which this trust anchor profile is associated.
Sample Output
*A:Dut-A#  show ipsec trust-anchor-profile 
==================================================================
Trust Anchor Profile Information
==================================================================
Name                             CA Profiles Down
------------------------------------------------------------------
CA0wCMPv2                        0
CA1wCMPv2                        0
CA2wCMPv2                        0
CA3wCMPv2                        0
CA4wCMPv2                        0
CA5wCMPv2                        0
CA6wCMPv2                        0
CA7wCMPv2                        0
CA8wCMPv2                        0
CA9wCMPv2                        0
CA10wCMPv2                       0
==================================================================
*A:Dut-A# 
 
 
 
*A:Dut-A# show ipsec trust-anchor-profile
==================================================================
Trust Anchor CA-profile List 
==================================================================
CA Profile                       Admin/Oper State
------------------------------------------------------------------
CA6                              up/up
CMPv2                            up/up
==================================================================
*A:Dut-A# 
ts-list
Syntax
ts-list [list-name]
ts-list list-name association
ts-list list-name entry [1..32]
Context
show>ipsec
Description
This command displays IPSec traffic-selector list information.
Parameters
list-name
Specifies the traffic-selector list name.
association
Displays information for which this traffic-selector list is associated.
entry [1..32]
Displays information for the specified entry.
Sample Output
show ipsec ts-list "ts1" 
===============================================================================
TS-List Local Entry
===============================================================================
Entry Id    IP Address Range or Prefix/Prefix-Len
-------------------------------------------------------------------------------
1           192.168.1.0/24
2           192.168.2.0/24
===============================================================================
show ipsec ts-list "ts1" association 
 
===============================================================================
IPsec gateway using traffic-selection-list
===============================================================================
SvcId      Type   SAP                          
-------------------------------------------------------------------------------
300        ies    tunnel-1.public:100          
===============================================================================
Number of entries: 1
===============================================================================
 
tunnel
Syntax
tunnel ipsec-tunnel-name
tunnel
Context
show>ipsec
Description
This command displays
Parameters
ipsec-tunnel-name
Specifies the name of the tunnel up to 32 characters in length.
tunnel-template
Syntax
tunnel-template [ipsec template identifier]
Context
show>ipsec
Description
This command displays
Parameters
ipsec template identifier
Displays an existing IPSec tunnel template ID.
Values
Sample Output
*A:ALA-48>config>ipsec# show ipsec tunnel-template 1
===============================================================================
IPSec Tunnel Template
===============================================================================
Id      Trnsfrm1  Trnsfrm2  Trnsfrm3  Trnsfrm4  ReverseRoute      ReplayWnd
-------------------------------------------------------------------------------
1       1         none      none      none      useSecurityPolicy 128
-------------------------------------------------------------------------------
Number of templates: 1
===============================================================================
*A:ALA-48>config>ipsec#
mc-ipsec
Syntax
mc-ipsec peer ip-address tunnel-group tunnel-group-id
mc-ipsec peer ip-address
Context
show>redundancy>multi-chassis
Description
This command displays the IPSec multi-chassis states. Optionally, only state of specified tunnel-group will be displayed.
Parameters
ip-address
Specifies the peer address.
tunnel-group-id
Specifies the tunnel-group.
Output
Show MC-IPSec Peer Command Output
The following table describes show redundancy multi-chassis mc-ipsec output fields.
Displays nominal or notReady.
notReady means the system is not ready for a switchover. There could be major traffic impact if switchover happens in case of notReady.
nominal means the tunnel-group is in a better situation to switchover than notReady. However there still might be traffic impact.
Sample Output
show redundancy multi-chassis mc-ipsec peer 2.2.2.2 
===============================================================================
Multi-Chassis MC-IPsec
===============================================================================
Peer Name       : (Not Specified)
Peer Addr       : 2.2.2.2             
Keep Alive Intvl: 1.0 secs            Hold on Nbr Fail     : 3
Discovery Intvl : 300 secs            Discovery Boot Intvl : 300 secs
BFD             : Disable             
Last update     : 09/27/2012 00:44:23 
 
======================================================================
Multi-Chassis IPsec Multi Active Tunnel-Group Table
======================================================================
ID             Peer Group     Priority  Admin State    Mastership
----------------------------------------------------------------------
1              2              100       Up             standby
----------------------------------------------------------------------
Multi Active Tunnel Group Entries found: 1
======================================================================
 
 
show redundancy multi-chassis mc-ipsec peer 2.2.2.2 tunnel-group 1 
===============================================================================
Multi-Chassis MC-IPsec Multi Active Tunnel-Group: 1
===============================================================================
Peer Ex Tnl Grp : 2                   Priority             : 100
Master State    : standby             Protection Status    : nominal
Admin State     : Up                  Oper State           : Up
===============================================================================
======================================================================
Multi-Chassis Tunnel Statistics
======================================================================
                              Static              Dynamic
----------------------------------------------------------------------
Installed                     1                   0
Installing                    0                   0
Awaiting Config               0                   0
Failed                        0                   0
======================================================================
 
 
Debug Commands
gateway
Syntax
gateway name name tunnel ip-address[:port] [nat-ip nat-ip[:port]] [detail] [no-dpd-debug]
no gateway name name tunnel ip-address[:port]
Context
debug>ipsec
Description
This command enables debugging for specified IPSec tunnel terminated on specified ipsec-gw.
Note that only one IPSec tunnel is allowed to enable debugging at a time.
Parameters
name name
Specifies the name of ipsec-gw.
tunnel ip-address
The tunnel IP address of remote peer.
port
The remote UDP port of IKE.
nat-ip port
specifies inside IP address and optionally port for NATed tunnel.
detail
Displays detailed debug information.
no-dpd-debug
Stops logging IKEv1 and IKEv2 DPD events for less noise during debug.
tunnel
Syntax
tunnel ipsec-tunnel-name [detail] [no-dpd-debug]
no tunnel ipsec-tunnel-name
Context
debug>ipsec
Description
This command enables debugging for specified IPSec tunnel.
Note that only one IPSec tunnel is allowed to enable debugging at a time.
Parameters
ipsec-tunnel-name
Specifies the name of ipsec-tunnel.
detail
Displays detailed debug information.
no-dpd-debug
Stops logging IKEv1 and IKEv2 DPD events for less noise during debug.
certificate
Syntax
certificate filename
Context
debug>ipsec
Description
This command enables debug for certificate chain computation in cert-profile.
Parameters
filename
Displays the filename of imported certificate.
cmpv2
Syntax
cmpv2
Context
debug
Description
This command enables the context to perform CMPv2 operations.
ca-profile
Syntax
[no] ca-profile profile-name
Context
debug>cmpv2
Description
This command debugs output of the specificied CA profile.
ocsp
Syntax
[no] ocsp ca-profile-name
Context
debug
Description
This command enable debug output of OCSP protocol for the specified CA
Default
no ocsp
Parameters
ca-profile-name
Specifies the name of an existing ca-profile.
 
 
Tools Commands
mc-ipsec
Syntax
mc-ipsec
Context
tools>perform>redundancy>multi-chassis>
Description
This command enables the mc-ipsec context.
force-switchover
Syntax
force-switchover tunnel-group local-group-id [now] [to {master|standby}]
 
Context
tools>perform>redundancy>multi-chassis>mc-ipsec
Description
This command manually switchover mc-ipsec mastership of specified tunnel-group.
Parameters
local-group-id
Specifies the local tunnel-group id configured in the config>redundancy>multi-chassis>peer>mc-ipsec context.
now
This optional parameter removes the prompt of confirmation.
to {master|standby}
specifies the desired mastership state to be achieved following a forced switch between this tunnel group and its redundant peer. If the target state matches the current state when the switch is attempted, then no switch will occur.