net ipsec ike-peerΒΆ

net ipsec ike-peer(1)				  BIG-IP TMSH Manual				net ipsec ike-peer(1)

NAME
       ike-peer - Configures one or more IKE peers for IPsec.

MODULE
       net ipsec

SYNTAX
       Configure the ike-peer component within the net ipsec module using the syntax in the following sections.

   CREATE/MODIFY
	create ike-peer [name]
	modify ike-peer [name]
	 options:
	   app-service [[string] | none]
	   ca-cert-file [certificate file]
	   crl-file [CRL file]
	   description [string]
	   dpd-delay [integer]
	   generate-policy [off | on | unique ]
	   lifetime [minutes]
	   mode [main | aggressive]
	   my-cert-file [certificate file]
	   my-cert-key-file [certificate key file]
	   my-cert-key-passphrase [none | [string] ]
	   my-id-type [address | asn1dn | fqdn | keyid-tag | user-fqdn]
	   my-id-value [string]
	   nat-traversal [on | off | force]
	   ocsp-cert-validator [ocsp-cert-validator-name-string]
	   ocsp-lifetime [minutes]
	   ocsp-jitter-percent [zero-to-fifty-percent]
	   passive [true | false]
	   peers-cert-file [certificate file]
	   peers-cert-type [certfile | none]
	   peers-id-type [address | asn1dn | fqdn | keyid-tag | user-fqdn]
	   peers-id-value [string]
	   phase1-auth-method [pre-shared-key | rsa-signature | dss | ecdsa-256 | ecdsa-384 | ecdsa-521 ]
	   phase1-encrypt-algorithm [3des | aes | blowfish | camellia | cast128 | des]
	   phase1-hash-algorithm [md5 | sha1 | sha256 | sha384 | sha512]
	   phase1-perfect-forward-secrecy [modp1024 | modp1536 | modp2048 | modp3072 | modp4096 | modp6144 | modp768 | modp8192 | ecp256 | ecp384 | ecp521 ]
	   preshared-key [string]
	   preshared-key-encrypted [string]
	   prf [sha1 | sha256 | sha384 | sha512]
	   proxy-support [disabled | enabled]
	   remote-address [ip address]
	   replay-window-size [integer]
	   state [disabled | enabled]
	   traffic-selector [name]
	   verify-cert [true | false]
	   version [add | delete | none | replace-all-with] {
	       [v1|v2]
	   }

   DISPLAY
	list ike-peer
	list ike-peer [name]
	show running-config ike-peer
	show running-config ike-peer [name]
	  options:
	    all-properties
	    non-default-properties
	    one-line

   DELETE
	delete ike-peer
	delete ike-peer [name]

DESCRIPTION
       You can use the ike-peer component to modify the IKE phase 1 parameters for each remote IKE peer. The setting
       in the default anonymous ike-peer will apply to any peer that does not match a more specific ike-peer
       directive.

EXAMPLES
       create ike-peer SanJose { remote-address 1.2.3.4  preshared-key abc phase1-auth-method pre-shared-key }

       Creates an ike-peer named SanJose that has the IP address of 1.2.3.4 using preshared key as the authentication
       method.

OPTIONS
       app-service
	    Specifies the name of the application service to which the object belongs. The default value is none.
	    Note: If the strict-updates option is enabled on the application service that owns the object, you cannot
	    modify or delete the object. Only the application service can modify or delete the object.

       ca-cert-file
	    Specifies the file name, which contains the certificates of the trusted root and intermediate certificate
	    authorities.

       crl-file
	    Specifies the file name of the Certificate Revocation List.

       description
	    User-defined description.

       dpd-delay
	    This option activates the Dead Peer Detection (DPD) and sets the time (in seconds) allowed between two
	    proofs of liveness requests. The default value is 30. When the value is set to 0, it means to disable DPD
	    monitoring, but still negotiate DPD support.

       generate_policy
	    This directive is for the responder. To use it, set passive to true so the IKE peer is only a responder.
	    If the responder does not have any policy in the Security Policy Database (SPD) during phase 2
	    negotiation, and the directive is set to on, then the racoon daemon chooses the first proposal in the
	    Security Association (SA) payload from the initiator, and generates policy entries from the proposal. It
	    is useful to negotiate with clients whose IP address is allocated dynamically. If an inappropriate policy
	    is installed into the responder's SPD by the initiator, other communications might fail due to a policy
	    mismatch between the initiator and the responder. The initiator ignores this directive. The default value
	    is off.

       lifetime
	    Specifies the lifetime of an IKE SA that will be proposed in the phase 1 negotiations.

       mode Specifies the exchange mode for phase 1 when racoon is the initiator, or the acceptable exchange mode
	    when racoon is the responder.

       my-cert-file
	    Specifies the name of my certificate file. The certificate type must match the phase1-auth-method value.
	    Note that there are no default certificates for DSS and ECDSA authentication methods.

       my-cert-key-file
	    Specifies the name of my certificate key file. The certificate key type must match the phase1-auth-method
	    value. Note that there are no default keys for DSS and ECDSA authentication methods.

       my-cert-key-passphrase
	    Specifies the passphrase of the key used for my-cert-key-file. Note that only IKEv2 supports passphrase.

       my-id-type
	    Specifies the identifier type sent to the remote host to use in the phase 1 negotiation.

       my-id-value
	    Specifies the identifier value sent to the remote host to use in the phase 1 negotiation.

       nat-traversal
	    Enables use of the NAT-Traversal IPsec extension (NAT-T). NAT-T allows one or both peers to reside behind
	    a NAT gateway (that is, performing address- or port-translation). The presence of NAT gateways along the
	    path is discovered during the phase 1 handshake, and if found, NAT-T is negotiated. When NAT-T is in
	    charge, all ESP and AH packets of a given connection are encapsulated into UDP datagrams (port 4500, by
	    default). The options are:

	    force
		 NAT-T is used regardless of whether NAT is detected between the peers.

	    off  NAT-T is not proposed/accepted. This is the default.

	    on	 NAT-T is used when a NAT gateway is detected between the peers.

       passive
	    Specify true if you do not want to be the initiator of the IKE negotiation with this ike-peer.

       peers-cert-file
	    Specifies the peer's certificate for authentication. Deprecated in IKEv2 configuration.

       peers-cert-type
	    Specifies that the only peers-cert-type supported is certfile. Deprecated in IKEv2 configuration.

       peers-id-type
	    Specifies that address, fqdn, asn1dn, user-fqdn, or keyid-tag can be used as peers-id-type.

       peers-id-value
	    Specifies the peer's identifier to be received. If it is not defined, then the IKE agent will not verify
	    the peer's identifier in the ID payload transmitted from the peer. The usage of peers-id-type and peers-
	    id-value is the same as my-id-type and my-id-value except that the individual component values of an
	    asn1dn identifier may specified as * to match any value (for example, "C=XX, O=MyOrg, OU=*, CN=Mine").

       phase1-auth-method
	    Defines the authentication method used for the phase 1 negotiation. Possible values are: pre-shared-key
	    if using preshared-key, and rsa-signature, dss, ecdsa-256, ecdsa-384 or ecdsa-521 if using X.509
	    certificate-based authentication. Note that dss, ecdsa certificates are supported in IKEv2 only."

       phase1-encrypt-algorithm
	    Specifies the encryption algorithm used for the ISAKMP phase 1 negotiation. This directive must be
	    defined. Possible value is one of following: des, 3des, blowfish, cast128, aes, or camellia for Oakley.

       phase1-hash-algorithm
	    Defines the hash algorithm used for the ISAKMP phase 1 negotiation. This directive must be defined. The
	    algorithm should be one of following: md5, sha1, sha256, sha384, or sha512 for Oakley.

       phase1-perfect-forward-secrecy
	    Defines the Diffie-Hellman group for key exchange to provide perfect forward secrecy. This directive must
	    be defined in one of Diffie-Hellman groups: modp768, modp1024, modp1536, modp2048, modp3072, modp4096,
	    modp6144 and modp8192, or one of Elliptic-Curve Diffie-Hellman groups: ecp256, ecp384 and ecp521. Note
	    that ECDH is supported in IKEv2 only.

       preshared-key
	    Specifies the preshared key for ISAKMP SAs. This field is valid only when phase1-auth-method is pre-
	    shared-key.

       preshared-key-encrypted
	    Specifies the preshared key for ISAKMP SAs. This field is valid only when phase1-auth-method is pre-
	    shared-key. Stores preshared-key in encrypted form.

       prf  Specifies the pseudo-random function to derive keying material for all cryptographic operations.

       proxy-support
	    If this value is enabled, both values of ID payloads in the phase 2 exchange are used as the addresses of
	    end-point of IPsec-SAs. This attribute must be enabled, which is the default value. This field is used
	    only for IKEv1.

       remote-address
	    Specifies the IP address of the IKE remote node.  The format required for specifying a route domain ID in
	    an IP address is A.B.C.D%ID.  For example, A.B.C.D%2, where the IP address A.B.C.D pertains to route
	    domain 2.  The route domain id should be same as the route domain id specified in the source/destination
	    address of the traffic selector associated with this remote node.

       replay-window-size
	    Specifies the replay window size of the IPsec SAs negotiated with the IKE remote node. This window limits
	    the number of out-of-order IPsec packets that can be received relative to the packet with the highest
	    sequence number that has been authenticated so far. Packets with older sequence numbers that are outside
	    this range are rejected. The default value is 64. The valid range is from 4 to 255.

       state
	    Enables or disables this IKE remote node.

       traffic-selector
	    Specifies the names of the traffic-selector objects associated with this ike-peer.

       verify-cert If set to true, the identifier sent by the remote host (as specified in its my_identifier
       statement) is compared with the credentials in the certificate as follows: Type asn1dn: the entire certificate
       subject name is compared with the identifier, e.g. \"C=XX, O=YY, ...\". Type address, fqdn, or user_fqdn: The
       certificate's subjectAltName is compared with the identifier. If the two do not match, the negotiation will
       fail. The default value is false, which is not to verify the identifier using the peer's certificate.
       version
	    Specifies which version of IKE to be used. The default value is v1. The following versions are available:

	    v1 Specifies version IKEv1 will be used.
	    v2	 Specifies version IKEv2 will be used.

SEE ALSO
       create, modify, delete, list, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2011-2013, 2015-2016. All rights reserved.

BIG-IP						      2019-02-15				net ipsec ike-peer(1)