R2511-HP MSR Router Series Security Configuration Guide(V5)
213
Figure 64 Network diagram
Configuration procedure
1. Make sure that Router A and Router B can reach each other.
2. Configure Router A:
# Configure ACL 3101 to identify traffic from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<RouterA> system-view
[RouterA] acl number 3101
[RouterA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0
0.0.0.255
[RouterA-acl-adv-3101] quit
# Create IPsec transform set tran1.
[RouterA] ipsec transform-set tran1
# Set the packet encapsulation mode to tunnel.
[RouterA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Use security protocol ESP.
[RouterA-ipsec-transform-set-tran1] transform esp
# Specify encryption and authentication algorithms.
[RouterA-ipsec-transform-set-tran1] esp encryption-algorithm des
[RouterA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[RouterA-ipsec-transform-set-tran1] quit
# Create IKE peer peer.
[RouterA] ike peer peer
# Set the pre-shared key.
[RouterA-ike-peer-peer] pre-shared-key abcde
# Specify the IP address of the peer security gateway.
[RouterA-ike-peer-peer] remote-address 2.2.2.2
[RouterA-ike-peer-peer] quit
# Create an IKE proposal numbered 10.
[RouterA] ike proposal 10
# Set the authentication algorithm to MD5.
[RouterA-ike-proposal-10] authentication-algorithm md5
# Set the authentication method to pre-shared key.
[RouterA-ike-proposal-10] authentication-method pre-share
# Set the ISAKMP SA lifetime to 5000 seconds.
Internet
Host A
10.1.1.2/24
Router A
Host B
10.1.2.2/24
Router B
Eth1/1
1.1.1.1/16
Eth1/1
2.2.2.2/16
Eth1/2
10.1.1.1/24
Eth1/2
10.1.2.1/24










