net ipsec ipsec-policyΒΆ

net ipsec ipsec-policy(1)			  BIG-IP TMSH Manual			    net ipsec ipsec-policy(1)

NAME
       ipsec-policy - Configures the IPsec security policy.

MODULE
       net ipsec

SYNTAX
       Configure the ipsec-policy component within the net ipsec module using the syntax in the following sections.

   CREATE/MODIFY
	 create ipsec-policy [name]
	 modify ipsec-policy [name]
	  options:
	    app-service [[string] | none]
	    description [string]
	    ike-phase2-auth-algorithm [aes-gcm128 | aes-gcm192 | aes-gcm256 | aes-gmac128 | aes-gmac192 | aes-gmac256 | sha1 | sha256 | sha384 | sha512]
	    ike-phase2-encrypt-algorithm [3des | aes128 | aes192 | aes256 | aes-gcm128 | aes-gcm192 | aes-gcm256 | aes-gmac128 | aes-gmac192 | aes-gmac256 | null]
	    ike-phase2-lifetime [integer]
	    ike-phase2-lifetime-kilobytes [integer]
	    ike-phase2-perfect-forward-secrecy [modp1024 | modp1536 | modp2048 | modp3072 | modp4096 | modp6144 | modp768 | modp8192]
	    ipcomp [deflate| none | null]
	    mode [transport | tunnel | interface]
	    protocol [esp]
	    tunnel-local-address [ip address]
	    tunnel-remote-address [ip address]

   DISPLAY
	 list ipsec-policy
	 list ipsec-policy [ [ [name] | [glob] | [regex] ] ... ]
	 show running-config ipsec-policy
	 show running-config ipsec-policy [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all-properties
	    non-default-properties
	    partition

DESCRIPTION
       An ipsec-policy indicates the ipsec rule and action to be applied to the packets matched by the traffic-
       selector associated with this ipsec-policy.

EXAMPLES
       create ipsec ipsec-policy tunnel_policy_sjc_sea { description "ipsec policy for the sjc-sea ipsec tunnel" mode
       tunnel tunnel-local-address 1.1.1.1 tunnel-remote-address 2.2.2.2 }

       Creates the tunnel mode ipsec-policy tunnel_policy_sjc_sea.

       delete ipsec ipsec-policy tunnel_policy_sjc_sea

       Deletes the ipsec-policy tunnel_policy_sjc_sea.

OPTIONS
       app-service
	    Specifies the name of the application service to which the object belongs. The default value is none.
	    Note: If the strict-updates option is enabled on the application service that owns the object, you cannot
	    modify or delete the object. Only the application service can modify or delete the object.

       description
	    User defined description.

       ike-phase2-auth-algorithm
	    Specifies a payload authentication algorithm for ESP. This attribute is only valid when IKE is used to
	    negotiate Security Associations. The possible options are: aes-gcm128, aes-gcm192, aes-gcm256,
	    aes-gmac128, aes-gmac192, aes-gmac256, sha256, sha384, sha512 and sha1. The default value is aes-gcm128.

	    Note: Because aes-gcm and aes-gmac are authenticated encryption algorithms, when
	    ike-phase2-auth-algorithm is set to aes-gcm or aes-gmac, ike-phase2-encrypt-algorithm has to be set to
	    the identical algorithm with the same key length. sha256, sha384, sha512 and sha1 can only be used with
	    an encryption algorithm that is NOT an authenticated encryption algorithm.

       ike-phase2-encrypt-algorithm
	    Specifies an encryption algorithm for ESP. This attribute is only valid when IKE is used to negotiate
	    security associations. The default value is aes-gcm128.

	    Note: Because aes-gcm and aes-gmac are authenticated encryption algorithms, when
	    ike-phase2-encrypt-algorithm is set to one of these algorithms, ike-phase2-auth-algorithm has to be set
	    to the identical algorithm with the same key length.

       ike-phase2-lifetime
	    Specifies the lifetime duration in minutes, for the dynamically-negotiated security associations (SA).
	    This attribute is only valid when IKE is used to negotiate security associations.

       ike-phase2-lifetime-kilobytes
	    Specifies the lifetime duration in kilobytes, for the dynamically-negotiated security associations (SA).
	    This attribute is only valid when IKE is used to negotiate security associations. A value of '0' means
	    the SA will not re-key based on the number of bytes encrypted/decrypted. The minimum recommended value is
	    1000 kilobytes. This value is not negotiated between peers."

       ike-phase2-perfect-forward-secrecy
	    Defines the group of Diffie-Hellman exponentiations. This attribute is only valid when IKE is used to
	    negotiate Security Associations. The value 'none' indicates that the PFS is disabled for phase2 SA
	    negotiations.

       mode Specifies a security protocol mode for use. The options are:

	    transport
		 IPsec transport mode is used.

	    tunnel
		 IPsec tunnel mode is used.

	    interface
		 IPsec interface mode is used.

       protocol
	    Specifies the IPsec protocol: Encapsulating Security Payload (ESP) or Authentication Header (AH).

       ipcomp
	    Specifies the compression algorithm for IPComp. The following codec are available:

	    none Disable IPComp

	    deflate
		 Packets will be encapsulated with IPComp header and Deflate compression algorithm will be applied to
		 the data.

	    null Packets will be encapsulated with IPComp header but no compression algorithm will be applied to the
		 data.

       tunnel-local-address
	    Specifies the IP address of the local IPsec tunnel endpoint. This option is only valid when mode is
	    tunnel.  The format required for specifying a route domain ID in an IP address is A.B.C.D%ID.  For
	    example, A.B.C.D%2, where the IP address A.B.C.D pertains to route domain 2.

       tunnel-remote-address
	    Specifies the IP address of the remote IPsec tunnel endpoint. This option is only valid when mode is
	    tunnel.  The format required for specifying a route domain ID in an IP address is A.B.C.D%ID.  For
	    example, A.B.C.D%2, where the IP address A.B.C.D pertains to route domain 2.

SEE ALSO
       list, net ipsec traffic-selector, net ipsec manual-security-association, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2008-2013, 2016. All rights reserved.

BIG-IP						      2020-01-06			    net ipsec ipsec-policy(1)