HP VPN Firewall Appliances VPN Configuration Guide

202
[FirewallB-acl-adv-3101] rule permit ip source 10.1.1.0 0.0.0.255 destination
10.2.2.0 0.0.0.255
[FirewallB-acl-adv-3101] quit
# Configure a static route to Host B.
[FirewallB] ip route-static 10.2.2.0 255.255.255.0 192.168.0.2
# Create IPsec transform set tran1.
[FirewallB] ipsec transform-set tran1
# Configure the IPsec transform set to use the tunnel encapsulation mode.
[FirewallB-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Configure the IPsec transform set to use the ESP security protocol.
[FirewallB-ipsec-transform-set-tran1] transform esp
# Configure ESP to use the DES encryption algorithm and the SHA1 authentication algorithm.
[FirewallB-ipsec-transform-set-tran1] esp encryption-algorithm des
[FirewallB-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[FirewallB-ipsec-transform-set-tran1] quit
# Create and configure IKE peer branch.
[FirewallB] ike peer branch
[FirewallB-ike-peer-branch] pre-shared-key abcde
[FirewallB-ike-peer-branch] local-address 192.168.0.1
[FirewallB-ike-peer-branch] remote-address 192.168.0.2
# Create an IPsec policy that use IKE, naming it map1 and setting its sequence number to 10.
[FirewallB] ipsec policy map1 10 isakmp
# Reference IPsec transform set tran1.
[FirewallB-ipsec-policy-isakmp-map1-10] transform-set tran1
# Reference ACL 3101.
[FirewallB-ipsec-policy-isakmp-map1-10] security acl 3101
# Reference IKE peer branch.
[FirewallB-ipsec-policy-isakmp-map1-10] ike-peer branch
[FirewallB-ipsec-policy-isakmp-map1-10] quit
# Apply IPsec policy group map1 to interface GigabitEthernet 0/2.
[FirewallB] interface gigabitethernet 0/2
[FirewallB-GigabitEthernet0/2] ipsec policy map1
[FirewallB-GigabitEthernet0/2] quit
# Enable IPsec stateful failover.
[FirewallB] ipsec synchronization enable
Configuring Firewall C
# Create ACL 3101, and add a rule to permit traffic from subnet 10.2.2.0/24 to subnet 10.1.1.0/24.
<FirewallC> system-view
[FirewallC] acl number 3101
[FirewallC-acl-adv-3101] rule permit ip source 10.2.2.0 0.0.0.255 destination 10.1.1.0
0.0.0.255
[FirewallC-acl-adv-3101] quit
# Configure a static route to Host A.
[FirewallC] ip route-static 10.1.1.0 255.255.255.0 192.168.0.1