R3721-F3210-F3171-HP High-End Firewalls VPN Configuration Guide-6PW101

138
# Set the pre-shared key.
[FirewallA-ike-peer-peer] pre-shared-key abcde
# Specify the IP address of the peer security gateway.
[FirewallA-ike-peer-peer] remote-address 2.2.2.2
[FirewallA-ike-peer-peer] quit
# Create an IKE proposal numbered 10.
[FirewallA] ike proposal 10
# Set the authentication algorithm to MD5.
[FirewallA-ike-proposal-10] authentication-algorithm md5
# Set the authentication method to pre-shared key.
[FirewallA-ike-proposal-10] authentication-method pre-share
# Set the ISAKMP SA lifetime to 5,000 seconds.
[FirewallA-ike-proposal-10] sa duration 5000
[FirewallA-ike-proposal-10] quit
# Create an IPsec policy that uses IKE negotiation.
[FirewallA] ipsec policy map1 10 isakmp
# Reference IPsec proposal tran1.
[FirewallA-ipsec-policy-isakmp-map1-10] proposal tran1
# Reference ACL 3101 to identify the protected traffic.
[FirewallA-ipsec-policy-isakmp-map1-10] security acl 3101
# Reference IKE peer peer.
[FirewallA-ipsec-policy-isakmp-map1-10] ike-peer peer
[FirewallA-ipsec-policy-isakmp-map1-10] quit
# Assign an IP address to interface GigabitEthernet 0/2.
[FirewallA] interface gigabitethernet 0/2
[FirewallA-GigabitEthernet0/2] ip address 10.1.1.1 255.255.255.0
[FirewallA-GigabitEthernet0/2] quit
# Assign an IP address to interface GigabitEthernet 0/1.
[FirewallA] interface gigabitethernet 0/1
[FirewallA-GigabitEthernet0/1] ip address 1.1.1.1 255.255.255.0
# Apply the IPsec policy to interface GigabitEthernet 0/1.
[FirewallA-GigabitEthernet0/1] ipsec policy map1
# Configure a static route to subnet 10.1.2.0/24.
[FirewallA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
Configuring Firewall B
# Configure ACL 3101 to identify traffic from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<FirewallB> system-view
[FirewallB] acl number 3101
[FirewallB-acl-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0
0.0.0.255
[FirewallB-acl-adv-3101] quit
[FirewallB] ipsec proposal tran1
# Create IPsec proposal tran1.