You are on page 1of 1

Juniper Mikrotik

Profiles:
IKE PROPOSAL:
Hash Algorithms: sha1
authentication-method pre-shared-keys;
Encryption Algorithm: aes-256
dh-group group2; DH GROUP:
modp1024
authentication-algorithm sha1;
Lifetime: 01:00:00
encryption-algorithm aes-256-cbc;
lifetime-seconds 3600;
Identities:
IKE POLICY: Auth. Method: pre
shared key
mode aggressive; My ID Type: user
fqdn
proposals Mikrotik-test;
MY ID: mikrotik@coreit.me
pre-shared-key ascii-text "$9$2UgGiPfz6CuQF"; ## SECRET-DATA

IKE GATEWAY: Proposal:

ike-policy Mikrotik-test-policy; Auth.


Algorithm: sha1
dynamic user-at-hostname "mikrotik@coreit.me"; Encr.
Algorithms aes-256 cbc
external-interface reth0.100; Lifetime:
1d 00:00:00:00
PFS Group: modp
1024

IPSEC PROPOSAL:
protocol esp;
authentication-algorithm hmac-sha1-96; Peers:
encryption-algorithm aes-256-cbc; Address:
94.102.233.11/32
lifetime-seconds 86400; Exchange
Mode:Aggressive

IPSEC POLICY:
perfect-forward-secrecy {
keys group2;
}
proposals Mikrotik-test-proposal;

IPSEC VPN:
bind-interface st0.44;
ike {
gateway Mikrotik-test;
ipsec-policy Mikrotik-policy;
}
establish-tunnels immediately;

You might also like