beautypg.com
vi
IPsec configuration examples······································································································································ 238
Configuring a manual mode IPsec tunnel for IPv4 packets ············································································ 238
Configuring an IKE-based IPsec tunnel for IPv4 packets ················································································· 241
Configuring IPsec for RIPng ································································································································ 243
Configuring IKE ······················································································································································· 247
Overview ······································································································································································· 247
IKE negotiation process ······································································································································ 247
IKE security mechanism ······································································································································· 248
Protocols and standards ····································································································································· 249
FIPS compliance ··························································································································································· 249
IKE configuration prerequisites ··································································································································· 249
IKE configuration task list ············································································································································ 249
Configuring an IKE profile ·········································································································································· 250
Configuring an IKE proposal ······································································································································ 252
Configuring an IKE keychain ······································································································································ 253
Configuring the global identity information ·············································································································· 254
Configuring the IKE keepalive function ······················································································································ 255
Configuring the IKE NAT keepalive function ············································································································ 256
Configuring IKE DPD···················································································································································· 256
Enabling invalid SPI recovery ····································································································································· 257
Setting the maximum number of IKE SAs ··················································································································· 257
Configuring SNMP notifications for IKE ···················································································································· 258
Displaying and maintaining IKE ································································································································· 258
IKE configuration examples ········································································································································ 259
Main mode IKE with pre-shared key authentication configuration example ················································ 259
Verifying the configuration ································································································································· 261
Troubleshooting IKE ····················································································································································· 261
IKE negotiation failed because no matching IKE proposals were found ······················································· 261
IKE negotiation failed because no IKE proposals or IKE keychains are referenced correctly····················· 262
IPsec SA negotiation failed because no matching IPsec transform sets were found ···································· 263
IPsec SA negotiation failed due to invalid identity information ······································································ 263
Configuring SSH ····················································································································································· 266
Overview ······································································································································································· 266
How SSH works ··················································································································································· 266
SSH authentication methods ······························································································································· 267
FIPS compliance ··························································································································································· 268
Configuring the device as an SSH server ·················································································································· 269
SSH server configuration task list ······················································································································ 269
Generating local key pairs ································································································································· 269
Enabling the SSH server ····································································································································· 270
Enabling the SFTP server ···································································································································· 270
Configuring NETCONF over SSH ····················································································································· 271
Configuring the user lines for SSH login ··········································································································· 271
Configuring a client's host public key ··············································································································· 272
Configuring an SSH user ···································································································································· 273
Setting the SSH management parameters ········································································································ 274
Configuring the device as an Stelnet client ··············································································································· 275
Stelnet client configuration task list ···················································································································· 275
Specifying the source IP address for SSH packets ··························································································· 275
Establishing a connection to an Stelnet server ································································································· 276
Configuring the device as an SFTP client ·················································································································· 278
SFTP client configuration task list ······················································································································· 278
Specifying the source IP address for SFTP packets ·························································································· 278