R3721-F3210-F3171-HP High-End Firewalls VPN Configuration Guide-6PW101
196
[FirewallB-ipsec-policy-manual-use1-10] sa string-key inbound esp abcdefg
[FirewallB-ipsec-policy-manual-use1-10] quit
# Configure the IP address of the GigabitEthernet interface.
[FirewallB] interface gigabitethernet 0/2
[FirewallB-GigabitEthernet0/2] ip address 2.2.3.1 255.255.255.0
# Apply the IPsec policy group to the interface.
[FirewallB-GigabitEthernet0/2] ipsec policy use1
Verifying the configuration
After the configuration, an IPsec tunnel between Firewall A and Firewall B should be established, and the
traffic between subnet 10.1.1.0/24 and subnet 10.1.2.0/24 should be IPsec protected.
IKE-based IPsec tunnel for IPv4 packets configuration example
Network requirements
As shown in Figure 127, configure an IPsec tunnel between Firewall A and Firewall B to protect data flows
between subnet 10.1.1.0/24 and subnet 10.1.2.0/24. Configure the tunnel to use the security protocol
ESP, the encryption algorithm DES, and the authentication algorithm SHA1-HMAC-96.
Configuring Firewall A
# Define an ACL to identify data flows from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<FirewallA> system-view
[FirewallA] acl number 3101
[FirewallA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255
[FirewallA-acl-adv-3101] quit
# Configure a static route to Host B.
[FirewallA] ip route-static 10.1.2.0 255.255.255.0 gigabitethernet 0/2
# Create an IPsec proposal named tran1.
[FirewallA] ipsec proposal tran1
# Specify the encapsulation mode as tunnel.
[FirewallA-ipsec-proposal-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[FirewallA-ipsec-proposal-tran1] transform esp
# Specify the algorithms for the proposal.
[FirewallA-ipsec-proposal-tran1] esp encryption-algorithm des
[FirewallA-ipsec-proposal-tran1] esp authentication-algorithm sha1
[FirewallA-ipsec-proposal-tran1] quit
# Configure the IKE peer.
[FirewallA] ike peer peer
[FirewallA-ike-peer-peer] pre-shared-key abcde
[FirewallA-ike-peer-peer] remote-address 2.2.3.1
[FirewallA-ike-peer-peer] quit
# Create an IPsec policy that uses IKE for IPsec SA negotiation.
[FirewallA] ipsec policy map1 10 isakmp