R3721-F3210-F3171-HP High-End Firewalls VPN Configuration Guide-6PW101

197
# Apply the IPsec proposal.
[FirewallA-ipsec-policy-isakmp-map1-10] proposal tran1
# Apply the ACL.
[FirewallA-ipsec-policy-isakmp-map1-10] security acl 3101
# Apply the IKE peer.
[FirewallA-ipsec-policy-isakmp-map1-10] ike-peer peer
[FirewallA-ipsec-policy-isakmp-map1-10] quit
# Configure the IP address of the GigabitEthernet interface.
[FirewallA] interface gigabitethernet 0/2
[FirewallA-GigabitEthernet0/2] ip address 2.2.2.1 255.255.255.0
# Apply the IPsec policy group to the interface.
[FirewallA-GigabitEthernet0/2] ipsec policy map1
Configuring Firewall B
# Define an ACL to identify data flows from subnet 10.1.2.0/24 to subnet 10.1.1.0/24.
<FirewallB> system-view
[FirewallB] acl number 3101
[FirewallB-acl-adv-3101] rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0
0.0.0.255
[FirewallB-acl-adv-3101] quit
# Configure a static route to Host A.
[FirewallB] ip route-static 10.1.1.0 255.255.255.0 gigabitethernet 0/2
# Create an IPsec proposal named tran1.
[FirewallB] ipsec proposal tran1
# Specify the encapsulation mode as tunnel.
[FirewallB-ipsec-proposal-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[RouterB-ipsec-proposal-tran1] transform esp
# Specify the algorithms for the proposal.
[FirewallB-ipsec-proposal-tran1] esp encryption-algorithm des
[FirewallB-ipsec-proposal-tran1] esp authentication-algorithm sha1
[FirewallB-ipsec-proposal-tran1] quit
# Configure the IKE peer.
[FirewallB] ike peer peer
[FirewallB-ike-peer-peer] pre-shared-key abcde
[FirewallB-ike-peer-peer] remote-address 2.2.2.1
[FirewallB-ike-peer-peer] quit
# Create an IPsec policy that uses IKE for IPsec SA negotiation.
[FirewallB] ipsec policy use1 10 isakmp
# Apply the ACL.
[FirewallB-ipsec-policy-isakmp-use1-10] security acl 3101
# Apply the IPsec proposal.
[FirewallB-ipsec-policy-isakmp-use1-10] proposal tran1
# Apply the IKE peer.