HP VPN Firewall Appliances VPN Configuration Guide

185
# Configure the IP address for GigabitEthernet 0/2.
[FirewallB] interface gigabitethernet 0/2
[FirewallB-GigabitEthernet0/2] ip address 2.2.3.1 255.255.255.0
# Apply the IPsec policy group to the interface.
[FirewallB-GigabitEthernet0/2] ipsec policy use1
3. Verify the configuration:
After the configuration, an IPsec tunnel between Firewall A and Firewall B should be established,
and the traffic between subnet 10.1.1.0/24 and subnet 10.1.2.0/24 should be IPsec protected.
IKE-based IPsec tunnel for IPv4 packets configuration example
Network requirements
As shown in Figure 128, configure an IPsec tunnel between Firewall A and Firewall B to protect data flows
between subnet 10.1.1.0/24 and subnet 10.1.2.0/24. Configure the tunnel to use the security protocol
ESP, the encryption algorithm DES, and the authentication algorithm SHA1-HMAC-96.
Configuration procedure
1. Configure Firewall A:
# Define an ACL to identify data flows from subnet 10.1.1.0/24 to subnet 10.1.2.0/24.
<FirewallA> system-view
[FirewallA] acl number 3101
[FirewallA-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.1.2.0 0.0.0.255
[FirewallA-acl-adv-3101] quit
# Configure a static route to Host B.
[FirewallA] ip route-static 10.1.2.0 255.255.255.0 2.2.2.2
# Create an IPsec transform set named tran1.
[FirewallA] ipsec transform-set tran1
# Specify the encapsulation mode as tunnel.
[FirewallA-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the security protocol as ESP.
[FirewallA-ipsec-transform-set-tran1] transform esp
# Specify the algorithms for the IPsec transform set.
[FirewallA-ipsec-transform-set-tran1] esp encryption-algorithm des
[FirewallA-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[FirewallA-ipsec-transform-set-tran1] quit
# Configure the IKE peer.
[FirewallA] ike peer peer
[FirewallA-ike-peer-peer] pre-shared-key abcde
[FirewallA-ike-peer-peer] remote-address 2.2.3.1
[FirewallA-ike-peer-peer] quit
# Create an IPsec policy that uses IKE for IPsec SA negotiation.
[FirewallA] ipsec policy map1 10 isakmp
# Apply the IPsec transform set.
[FirewallA-ipsec-policy-isakmp-map1-10] transform-set tran1