F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices VPN Configuration Guide-6PW100

188
212BManual mode IPsec tunnel for IPv4 packets configuration
example
455BNetwork requirements
As shown in 802HFigure 128, configure an IPsec tunnel between Firewall A and Firewall B to protect data flows
between subnet 10.1.1.0/24 and subnet 10.1.2.0/24. Configure the tunnel to use the security protocol
ESP, the encryption algorithm DES, and the authentication algorithm SHA1-HMAC-96.
Figure 128 Network diagram
456BConfiguration procedure
1. Configure Firewall A:
# Define an ACL to identify data flows from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<FirewallA> system-view
[FirewallA] acl number 3101
[FirewallA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[FirewallA-acl-adv-3101] quit
# Configure a static route to Host B.
[FirewallA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
# Create an IPsec transform set named tran1.
[FirewallA] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[FirewallA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[FirewallA-ipsec-transform-set-tran1] transform esp
# Specify the algorithms for the IPsec transform set.
[FirewallA-ipsec-transform-set-tran1] esp encryption-algorithm des
[FirewallA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[FirewallA-ipsec-transform-set-tran1] quit
# Create manual IPsec policy map1.
[FirewallA] ipsec policy map1 10 manual
# Apply the ACL.
[FirewallA-ipsec-policy-manual-map1-10] security acl 3101
# Apply the IPsec transform set.
Internet
GE0/2
2.2.2.1/24
GE0/2
2.2.3.1/24
GE0/1
10.1.1.1/24
GE0/1
10.1.2.1/24
Firewall A Firewall B
Host A
10.1.1.2/24
Host B
10.1.2.2/24