beautypg.com

Configuring an ipsec policy that uses ike, Configuration prerequisites, Directly configuring an ipsec policy that uses ike – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 368

background image

354

Configuring an IPsec policy that uses IKE

To configure an IPsec policy that uses IKE, use one of the following methods:

Directly configure it by configuring the parameters in IPsec policy view.

Configure it by referencing an existing IPsec policy template with the parameters to be negotiated
configured. A device referencing an IPsec policy that is configured in this way cannot initiate SA

negotiation but can respond to a negotiation request. The parameters not defined in the template

will be determined by the initiator. This approach applies to scenarios where the remote end's
information, such as the IP address, is unknown.

NOTE:

You cannot change the creation mode of an IPsec policy between the two, direct configuration and
configuration by referencing an IPsec policy template. To create an IPsec policy in another creation mode,

delete the current one and then configure a new IPsec policy.

Configuration prerequisites

Before you configure an IPsec policy that uses IKE, complete the following tasks:

Configure the IPsec proposals for the IPsec policy.
With SAs to be established through IKE negotiation, an IPsec policy can reference up to six IPsec
proposals. During negotiation, IKE searches for a fully matched IPsec proposal at the two ends of

the expected IPsec tunnel. If no match is found, no SA can be set up and the packets expecting to
be protected will be dropped.

Configure the IKE peer.
For more information about IKE peer configuration, see "Configuring IKE."

The parameters for the local and remote ends must match.

Directly configuring an IPsec policy that uses IKE

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Create an IPsec policy that
uses IKE and enter its view.

ipsec policy policy-name
seq-number isakmp

By default, no IPsec policy exists.

3.

Configure an IPsec connection
name.

connection-name name

Optional.
By default, no IPsec connection

name is configured.

4.

Assign an ACL to the IPsec
policy.

security acl acl-number
[ aggregation | per-host ]

By default, an IPsec policy
references no ACL.

5.

Assign IPsec proposals to the
IPsec policy.

proposal proposal-name&<1-6>

By default, an IPsec policy
references no IPsec proposal.

6.

Specify an IKE peer for the
IPsec policy.

ike-peer peer-name

An IPsec policy cannot reference
any IKE peer that is already
referenced by an IPsec profile, and

vice versa.