Displaying and maintaining port security, Port security configuration examples, Autolearn configuration example – H3C Technologies H3C S12500-X Series Switches User Manual
Page 144: Ipsec tunnel establishment, Implementing acl-based ipsec, Protocols and standards, Feature restrictions and guidelines, Acl-based ipsec configuration task list
![background image](https://www.manualsdir.com/files/812698/content/doc144.png)
132
The device supports the following data flow protection modes:
•
Standard mode—One IPsec tunnel protects one data flow. The data flow permitted by an ACL rule
is protected by one IPsec tunnel that is established solely for it.
•
Aggregation mode—One IPsec tunnel protects all data flows permitted by all the rules of an ACL.
This mode is only used to communicate with old-version devices.
•
Per-host mode—One IPsec tunnel protects one host-to-host data flow. One host-to-host data flow is
identified by one ACL rule and protected by one IPsec tunnel established solely for it. This mode
consumes more system resources when multiple data flows exist between two subnets to be
protected.
235B
Protocols and standards
•
RFC 2401, Security Architecture for the Internet Protocol
•
RFC 2402, IP Authentication Header
•
RFC 2406, IP Encapsulating Security Payload
•
RFC 4552, Authentication/Confidentiality for OSPFv3
94B
IPsec tunnel establishment
Implementing ACL-based IPsec protects packets identified by an ACL. To establish an ACL-based IPsec
tunnel, configure an IPsec policy, reference an ACL in the policy, and apply the policy to an interface (see
"
840H
Implementing ACL-based IPsec
"). The IPsec tunnel establishment steps are the same in an IPv4 network
and in an IPv6 network.
95B
Implementing ACL-based IPsec
236B
Feature restrictions and guidelines
ACLs for IPsec take effect only on traffic that is generated by the device and traffic that is destined for the
device. They do not take effect on traffic forwarded through the device. For example, an ACL-based IPsec
tunnel can protect log messages the device sends to a log server, but it cannot protect all the data flows
and voice flows that are forwarded by the device. For more information about configuring an ACL for
IPsec, see "
841H
Configuring an ACL
."
Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51 and
50. Make sure traffic of these protocols is not denied on the interfaces with IKE or IPsec configured.
237B
ACL-based IPsec configuration task list
The generic configuration procedure for implementing ACL-based IPsec is as follows:
1.
Configure an ACL for identifying data flows to be protected.
2.
Configure IPsec transform sets to specify the security protocols, authentication and encryption
algorithms, and the encapsulation mode.
- H3C S5560 Series Switches H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C WX3000 Series Unified Switches H3C LSWM1WCM10 Access Controller Module H3C LSWM1WCM20 Access Controller Module H3C LSQM1WCMB0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module H3C LSBM1WCM2A0 Access Controller Module H3C S9800 Series Switches H3C S5130 Series Switches H3C S5120 Series Switches