R3721-F3210-F3171-HP High-End Firewalls VPN Configuration Guide-6PW101
213
# Create ACL 3101, and add a rule to permit traffic from subnet 10.1.1.0/24 to subnet
10.2.2.0/24.
[FirewallB] acl number 3101
[FirewallB-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.2.2.0 0.0.0.255
[FirewallB-acl-adv-3101] quit
# Configure a static route to Host B.
[FirewallB] ip route-static 10.2.2.0 255.255.255.0 192.168.0.2
# Create IPsec proposal tran1.
[FirewallB] ipsec proposal tran1
# Configure the proposal to use the tunnel encapsulation mode.
[FirewallB-ipsec-proposal-tran1] encapsulation-mode tunnel
# Configure the proposal to use the ESP security protocol.
[FirewallB-ipsec-proposal-tran1] transform esp
# Configure ESP to use the DES encryption algorithm and the SHA1 authentication algorithm.
[FirewallB-ipsec-proposal-tran1] esp encryption-algorithm des
[FirewallB-ipsec-proposal-tran1] esp authentication-algorithm sha1
[FirewallB-ipsec-proposal-tran1] quit
# Create and configure IKE peer branch.
[FirewallB] ike peer branch
[FirewallB-ike-peer-branch] pre-shared-key abcde
[FirewallB-ike-peer-branch] local-address 192.168.0.1
[FirewallB-ike-peer-branch] remote-address 192.168.0.2
# Create an IPsec policy that use IKE, naming it map1 and setting its sequence number to 10.
[FirewallB] ipsec policy map1 10 isakmp
# Reference IPsec proposal tran1.
[FirewallB-ipsec-policy-isakmp-map1-10] proposal tran1
# Reference ACL 3101.
[FirewallB-ipsec-policy-isakmp-map1-10] security acl 3101
# Reference IKE peer branch.
[FirewallB-ipsec-policy-isakmp-map1-10] ike-peer branch
[FirewallB-ipsec-policy-isakmp-map1-10] quit
# Apply IPsec policy group map1 to interface GigabitEthernet 0/2.
[FirewallB] interface gigabitethernet 0/2
[FirewallB-GigabitEthernet0/2] ipsec policy map1
[FirewallB-GigabitEthernet0/2] quit
# Enable IPsec stateful failover.
[FirewallB] ipsec synchronization enable
Configuring Router
Assign IPv4 addresses to the interfaces. Make sure that Firewall A, Firewall B, and Router have IP
connectivity between them.
# Create ACL 3101, and add a rule to permit traffic from subnet 10.2.2.0/24 to subnet 10.1.1.0/24.
<Router> system-view
[Router] acl number 3101