R2511-HP MSR Router Series Security Configuration Guide(V5)

202
# Use DES as the encryption algorithm and SHA1-HMAC-96 as the authentication algorithm.
[RouterB-ipsec-transform-set-tran1] esp encryption-algorithm des
[RouterB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterB-ipsec-transform-set-tran1] quit
# Create IKE peer peer.
[RouterB] ike peer peer
# Set the pre-shared key.
[RouterB-ike-peer-peer] pre-shared-key abcde
# Specify the IP address of the peer security gateway.
[RouterB-ike-peer-peer] remote-address 1.1.1.1
[RouterB-ike-peer-peer] quit
# Create an IPsec policy that uses IKE.
[RouterB] ipsec policy use1 10 isakmp
# Reference ACL 3101 to identify the protected traffic.
[RouterB-ipsec-policy-isakmp-use1-10] security acl 3101
# Reference IPsec transform set tran1.
[RouterB-ipsec-policy-isakmp-use1-10] transform-set tran1
# Reference IKE peer peer.
[RouterB-ipsec-policy-isakmp-use1-10] ike-peer peer
[RouterB-ipsec-policy-isakmp-use1-10] quit
# Apply IPsec policy use1 to interface Ethernet 1/1.
[RouterB] interface ethernet 1/1
[RouterB-Ethernet1/1] ipsec policy use1
4. Verify the configuration:
# Send traffic from subnet 10.5.5.0/24 to subnet 10.4.4.0/24, or from subnet 10.4.4.0/24 to
10.5.5.0/24. IKE negotiation is triggered to establish IPsec SAs between Router A and Router B.
# Display the routing table on Router A.
[RouterA] display ip routing-table
Routing Tables: Public
Destinations : 8 Routes : 8
Destination/Mask Proto Pre Cost NextHop Interface
1.1.0.0/16 Direct 0 0 1.1.1.1 Eth1/1
1.1.1.1/32 Direct 0 0 127.0.0.1 InLoop0
2.2.2.0/24 Static 60 0 1.1.1.2 Eth1/1
10.4.4.0/24 Direct 0 0 10.4.4.1 Eth1/2
10.4.4.4/32 Direct 0 0 127.0.0.1 InLoop0
10.5.5.0/24 Static 60 0 1.1.1.2 Eth1/1
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0
The output shows that IPsec RRI has created a static route to subnet 10.5.5.0/24 with the next hop
1.1.1.2.
# Delete the IPsec SAs.
The static route is automatically deleted.