Reference Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 CLI | Reference Guide crypto-local ipsec-map | 201
Usage Guidelines
You can use controllers instead of VPN concentrators to connect sites at different physical locations.
You can configure separate CA and server certificates for each site-to-site VPN. You can also configure the same
CA and server certificates for site-to-site VPN and client VPN. Use the show crypto-local ipsec-map command to
display the certificates associated with all configured site-to-site VPN maps; use the tag <map> option to display
certificates associated with a specific site-to-site VPN map.
ArubaOS supports site-to-site VPNs with two statically addressed controllers, or with one static and one
dynamically addressed controller. By default, site-to-site VPN uses IKE Main-mode with Pre-Shared-Keys to
authenticate the IKE SA. This method uses the IP address of the peer, and therefore will not work for dynamically
addressed peers.
To support site-site VPN with dynamically addressed devices, you must enable IKE Aggressive-Mode with
Authentication based on a Pre-Shared-Key. A controller with a dynamic IP address must be configured to be the
initiator of IKE Aggressive-mode for Site-Site VPN, while the controller with a static IP address must be
configured as the responder of IKE Aggressive-mode.
Examples
The following commands configures site-to-site VPN between two controllers:
(host) (config) #crypto-local ipsec-map sf-chi-vpn 100
src-net 101.1.1.0 255.255.255.0
dst-net 100.1.1.0 255.255.255.0
peer-ip 172.16.0.254
vlan 1
trusted
(host) (config) #crypto-local ipsec-map chi-sf-vpn 100
src-net 100.1.1.0 255.255.255.0
dst-net 101.1.1.0 255.255.255.0
peer-ip 172.16.100.254
vlan 1
trusted
set security-association
lifetime seconds <seconds>
Configures the lifetime, in seconds, for the security
association (SA).
300-86400 7200
seconds
set server-certificate <cert-
name>
User-defined name of a server certificate installed in
the controller. Use the show crypto-local pki
ServerCert command to display the server certificates
that have been imported into the controller.
——
set transform-set <name1> Name of the transform set for this IPsec map. One
transform set name is required, but you can specify up
to four transform sets. Configure transform sets with
the crypto ipsec transform-set command.
default-
transform
src-net <ipaddr> <mask> IP address and netmask for the source network.
trusted Enables or disables a trusted tunnel. enable/
disable
disabled
version v1|v2 Select the IKE version for the IPsec map.
v1: IKEv1
v2: IKEv2
v1
vlan <vlan> VLAN ID. Enter 0 for the loopback. 1-4094
Parameter Description Range Default