beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 14

background image

viii

Configuring an IPsec proposal ··································································································································· 351

 

Configuring an IPsec policy ········································································································································ 352

 

Configuring a manual IPsec policy···················································································································· 352

 

Configuring an IPsec policy that uses IKE ········································································································· 354

 

Applying an IPsec policy group to an interface ······································································································· 357

 

Configuring IPsec stateful failover ······························································································································ 358

 

Configuration prerequisites ································································································································ 358

 

Configuration procedure ···································································································································· 358

 

Displaying and maintaining IPsec ······························································································································ 359

 

Configuration example for IPsec between AC and AP ···························································································· 359

 

IPsec stateful failover configuration example ············································································································ 360

 

Configuring IKE ······················································································································································· 368

 

Overview ······································································································································································· 368

 

IKE security mechanism ······································································································································· 368

 

IKE operation ······················································································································································· 368

 

IKE functions ························································································································································· 369

 

Relationship between IKE and IPsec ·················································································································· 370

 

Protocols and standards ····································································································································· 370

 

IKE configuration task list ············································································································································ 370

 

Configuring a name for the local security gateway ································································································· 371

 

Configuring an IKE proposal ······································································································································ 371

 

Configuring an IKE peer ·············································································································································· 372

 

Setting keepalive timers ··············································································································································· 374

 

Setting the NAT keepalive timer ································································································································· 374

 

Configuring a DPD detector ········································································································································ 375

 

Disabling next payload field checking ······················································································································ 375

 

Displaying and maintaining IKE ································································································································· 376

 

IKE configuration example ·········································································································································· 376

 

Troubleshooting IKE ····················································································································································· 376

 

Proposal mismatch ·············································································································································· 376

 

Failing to establish an IPsec tunnel ···················································································································· 377

 

Index ········································································································································································ 378