HP MSR2000/3000/4000 Router Series Security Configuration Guide
163
# Create a manual IPsec policy named use1, with the sequence number as 10.
[RouterB] ipsec policy use1 10 manual
# Apply ACL 3101.
[RouterB-ipsec-policy-manual-use1-10] security acl 3101
# Apply IPsec transform set tran1.
[RouterB-ipsec-policy-manual-use1-10] transform-set tran1
# Specify the remote IP address of the IPsec tunnel as 2.2.2.1.
[RouterB-ipsec-policy-manual-use1-10] remote-address 2.2.2.1
# Configure the inbound and outbound SPIs for ESP.
[RouterB-ipsec-policy-manual-use1-10] sa spi outbound esp 54321
[RouterB-ipsec-policy-manual-use1-10] sa spi inbound esp 12345
# Configure the inbound and outbound SA keys for ESP.
[RouterB-ipsec-policy-manual-use1-10] sa string-key outbound esp simple gfedcba
[RouterB-ipsec-policy-manual-use1-10] sa string-key inbound esp simple abcdefg
[RouterB-ipsec-policy-manual-use1-10] quit
# Apply the IPsec policy use1 to interface Ethernet 1/2.
[RouterB] interface ethernet1/2
[RouterB-Ethernet1/2] ipsec policy use1
[RouterB-Ethernet1/2] quit
Verifying the configuration
After the previous configurations, an IPsec tunnel between Router A and Router B is established, and the
traffic between subnet 10.1.1.0/24 and subnet 10.1.2.0/24 is IPsec protected.
Use the display ipsec sa command to display IPsec SAs on Router A and Router B. Take Router A as an
example:
[RouterA] display ipsec sa
-------------------------------
Interface: Ethernet1/2
-------------------------------
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: manual
-----------------------------
Tunnel id: 549
Encapsulation mode: tunnel
Path MTU: 1443
Tunnel:
local address: 2.2.2.1
remote address: 2.2.3.1
Flow:
as defined in ACL 3101
[Inbound ESP SA]
SPI: 54321 (0x0000d431)
Transform set: ESP-ENCRYPT-AES-CBC-128 ESP-AUTH-SHA1
No duration limit for this SA










