An IKE proposal defines a set of attribute data to describe how IKE negotiation implements security communications. Configuring an IKE proposal involves creating an IKE proposal, selecting an encryption algorithm, authentication mode, authentication algorithm, and Diffie-Hellman identifier, and setting the lifetime of the SA.
Parameters defined by an IKE proposal are used to negotiate IKE SA establishment. You can configure multiple IKE proposals on each end. During the negotiation, parameters to be negotiated are matched against each IKE proposal in descending order by priority and match a local IKE proposal that is the same as that on the peer end. The match rule is as follows: Both parties use the same encryption algorithm, authentication algorithm, authentication method, and DH group ID to negotiate with each other. The lifetime is determined by the party that initiates the negotiation and does not need to be identical on both ends.
If the negotiation initiating party specifies an IKE proposal on the IKE peer, only the specified IKE protocol can be sent during the IKE negotiation. The response party matches the specified IKE protocol against its IKE proposals. If no IKE proposal is matched, the negotiation fails.
If the negotiation initiating party does not specify any IKE proposal on the IKE peer, all IKE proposals of the initiating party are sent during the IKE negotiation. The response party matches the IKE proposals against its IKE proposals in sequence.
The system provides three default IKE proposals. If no IKE proposal is created, defult1, eflut2, and deflut3 are used.
The default IKE proposals contain insecure algorithms. To ensure better security, you are advised not to use the default IKE proposals.
defult1: The encryption algorithm is AES-CBC-256, the authentication algorithm is SHA2-256, the authentication method is Pre-Shared Key, the Diffie-Hellman group ID is group14, and the lifetime is 86400 seconds.
You can run the display ike proposal command to view the configured IKE proposals (including the default IKE proposals).
The system view is displayed.
IKE proposals are created, and the IKE proposal view is displayed.
For a newly created IKE proposal, the default encryption algorithm is AES-CBC-256, the default authentication algorithm is SHA2-256, the default authentication method is Pre-Shared Key, the default Diffie-Hellman group ID is not configured, and the default lifetime is 86400 seconds. Change the values of these parameters as required. The new values take effect in the next tunnel negotiation instead of tunnels that have been negotiated.
An authentication mode is configured.
An authentication algorithm is configured.
To help improve the system security, do not use the MD5 or SHA1 authentication algorithm for IKE negotiation.
An encryption algorithm is configured.
To help improve the system security, do not use the DES-CBC or 3DES-CBC encryption algorithm for IKE negotiation.
A DH group ID is set.
To help improve system security, using the group1, group2, and group5 for the DH group ID is not recommended.
An integrity algorithm is configured.
The configuration is valid only for the IKEv2 protocol.
To help improve the system security, using the AES-XCBC-96, HMAC-MD5-96, and HMAC-SHA1-96 integrity algorithms for IKEv2 negotiation is not recommended.
An SA duration is set.
The re-authentication duration of an IKEv2 SA is set.
The configuration is committed.