H3C Technologies H3C SecPath F1000-E User Manual
Page 140

12
•
Both ends of an IPsec tunnel must be configured with the same key in the same format, and the keys
of the inbound and outbound SAs at an end must be in the same format.
When you configure an IPsec policy for an IPv6 routing protocol, the following requirements are also
needed:
•
ACLs and IPsec tunnel addresses are not needed.
•
The SPI and keys of the inbound and outbound SAs must be identical at the local end.
•
The SPI and key configured on all devices within a scope must be identical. The scope is determined
by the IPv6 routing protocol to be protected. For OSPFv3, the scope refers to directly connected
neighbors or an OSPFv3 area. For RIPng, the scope refers to directly connected neighbors or a
RIPng process. For IPv6 BGP, the scope refers to directly connected neighbors or a neighbor group.
2.
Configuring procedure
Following these steps to configure an IPsec policy manually:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Manually create an IPsec policy and
enter its view
ipsec policy policy-name
seq-number manual
Required
By default, no IPsec policy exists.
Specify the ACL for the IPsec policy
to reference
security acl acl-number
Not needed for IPsec policies to be
applied to IPv6 routing protocols
and required for other applications.
By default, an IPsec policy
references no ACL.
The ACL supports match criteria of
the VPN instance attribute.
Specify the IPsec proposals for the
IPsec policy to reference
proposal proposal-name
Required
By default, an IPsec policy
references no IPsec proposal.
Configure the
local address of
the tunnel
tunnel local ip-address
Not needed for IPsec policies to be
applied to IPv6 routing protocols
and required for other applications.
Not configured by default
Configure the
two ends of the
IPsec tunnel
Configure the
remote address
of the tunnel
tunnel remote ip-address
Required
Not configured by default
Configure the SPIs for the SAs
sa spi { inbound | outbound }
{ ah | esp } spi-number
Required
Configure the
authentication
key (in
hexadecimal)
sa authentication-hex { inbound
| outbound } { ah | esp } hex-key
Configure keys
for the SAs
Configure the
authentication
key
(in characters)
sa string-key { inbound |
outbound } { ah | esp } string-key
Required
Use either command
For ESP, the system can
automatically generate both the
authentication key and encryption
key.