ipsec > security-policy
This configuration element defines multiple policy instances with each policy defining match criteria and an operational action performed on matching traffic flows.
Parameters
- name
- Enter a unique identifier for this security-policy instance.
- Default: none
- Value: A valid configuration element name that is unique within the security-policy namespace.
- network-interface
- Enter the unique name of the network-interface supported by this security-policy instance.
Identify the network interface by providing the interface name and VLAN ID separated by a colon; for example access:10.
- Default: None
- Values: Name and VLAN ID of an existing network-interface configuration element.
- priority
- Set the priority of this security-policy instance, where 0 is the highest priority
- Default: 0
- Values: Min: 0 | Max: 126
- local-ip-addr-match
- Enter an IPv4 address; in conjunction with local-ip-mask and local-port-match, this parameter specifies address-based matching criteria for inbound traffic.
Note:
Specifically, local-ip-addr-match works with local-ip-mask to define a range of inbound IP address subject t this security-policy instance. Using default values for both properties, the security-policy instance matches all IPv4 addresses.- Default: 0.0.0.0
- Values: A valid IPv4 address; the special address value, 0.0.0.0 matches all IPv4 addresses.
- remote-ip-addr-match
- Enter an IPv4 address; in conjunction with remote-ip-mask and remote-port-match specifies address-based matching criteria for outbound traffic.
Note:
Specifically, remote-ip-addr-match works with remote-ip-mask to define a range of outbound IP addresses subject to this security-policy instance. Using default values for both properties, the security-policy instance matches all IPv4 addresses.- Default: 0.0.0.0
- Values: A valid IPV4 address; the special address value, 0.0.0.0 matches all IPv4 addresses.
- local-port-match
- Enter a port number, or the special value 0; in conjunction with local-ip-addr-match and local-ip-mask, the parameter specifies address-based matching criteria for inbound traffic.
The default value disables port-based matching, meaning port numbers are ignored in the default state.
- Default: 0 (disables port-based matching)
- Values: Min: 0 / Max: 65535
- remote-port-match
- Enter a port number, or the special value 0; in conjunction with remote-ip-addr-match and remote-ip-mask, this parameter specifies address-based matching criteria for outbound traffic.
The default value disables port-based matching, meaning port numbers are ignored in the default state.
- Default: 0 (disables port-based matching)
- Values: Min: 0 / Max: 65535
- trans-protocol-match
- Select a specified protocol or the special value all that specifies transport-protocol-based matching criteria for inbound and outbound traffic.
The default value all matches all supported transport layer protocols
- Default: all
- Values: all | ICMP | SCTP | TCP | UDP
- direction
- Select an indicator of the directionality of this security-policy instance.
- Default: both
- Values: both - the policy applies to all traffic. | in - the policy applies only to inbound traffic. | out - the policy applies only to outbound traffic.
- local-ip-mask
- Enter am IPv4 address; in conjunction with local-ipaddr-match and local-port-match, this parameter specifies address-based matching criteria for inbound traffic.
Specifically, local-ip-addr-match works with local-ip-mask to define a range of inbound IP addresses subject to this security-policy instance matches all IPv4 addresses.
- Default: 255.255.255.255
- Values: A dotted decimal IP address mask.
- remote-ip-mask
- Enter an IPv4 address; in conjunction with remote-ip-addr-match and remote-port-match, this parameter specifies address-based matching criteria for outbound traffic.
Specifically, remote-ipaddr-match works with remote-ip-mask to define a range of out IP addresses subject to this security-policy instance matches all IPv4 addresses.
- Default: 255.255.255.255
- Values: A valid IPv4 address mask
- action
- Select the process of trafficking that conforms to the match criteria specified by this security-policy instance.
- Default: ipsec
- Values: allow-forwards matching traffic but performs no security processing. | discard-discards matching traffic | ipsec-processes matching traffic per configured IPsec properties.
- outbound-sa-fine-grained-mask
- not used for IKE operation.
- ike-sainfo-name
- Enter the name of the
ike-sainfo
configuration element assigned to this security-policy instance.
- Default: None
- Values: A valid configuration element name that is unique within the ike-sainfo namespace.
Note:
The ike-sainfo configuration element identifies the algorithms and protocols available for the establishment if IP sec Security Associations (SA). - pre-fragmentation
- Select, when the value of
action is
ipsec, whether to enable IPSec packet fragmentation before encryption. When enabled, the MSG fragments outbound jumbo packets before they can be transmitted and then encrypts the fragments so that each transmitted encrypted fragment packet has a valid Encapsulating Security Payload (ESP) header.
- Default: disabled
- Values: disabled | enabled