beautypg.com

Configuring an ipsec profile – H3C Technologies H3C SecPath F1000-E User Manual

Page 148

background image

20

Task Remarks

Applying a QoS Policy to an IPsec Tunnel Interface

Optional

Enabling the Encryption Engine

Optional

Configuring the IPsec Anti-Replay Function

Optional

Configuring an IPsec Profile

As described previously, an IPsec policy is uniquely identified by its name and sequence number. An

IPsec policy group is a collection of IPsec policies with the same name but different sequence numbers.

In an IPsec policy group, an IPsec policy with a smaller sequence number has a higher priority. After an

IPsec policy group is applied to an interface, for each packet arriving at the interface, the system checks

the IPsec policies of the IPsec policy group in the ascending order of sequence numbers. An IPsec tunnel
will be established for each data flow to be protected. Thus, multiple IPsec tunnels may exist on an

interface.
Different from IPsec policies, an IPsec profile is uniquely identified by its name and can contain only one

IPsec policy. It does not support ACL configuration. An IPsec profile defines the IPsec proposal for the

data flows to be protected, and specifies the parameters for IKE negotiation. After an IPsec profile is

applied to an IPsec tunnel interface, only one IPsec tunnel is set up to protect all data flows that are routed
to the tunnel.
At present, IPsec profiles can be applied to only IPsec tunnel interface. The IPsec tunnel established using

an IPsec profile protects all IP data routed to the tunnel interface.
Before configuring an IPsec profile, finish the following configurations:

IPsec proposal configuration. For details, refer to

Configuring an IPsec Proposal

.

IKE peer configuration. For details, refer to

Configuring an IKE Peer

.

Note that the parameters for the local and remote ends must match.

NOTE:

During IKE negotiation based on an IPsec profile, the source and destination addresses of the IPsec
tunnel interface are used as the local and remote addresses, that is, the local-address and

remote-address commands configured for IKE negotiation do not take effect.

If you do not configure the destination address of the IPsec tunnel interface, the local peer can only be
an IKE negotiation responder; it cannot initiate an IKE negotiation.

Follow these steps to configure an IPsec profile:

To do…

Use the command…

Remarks

Enter system view

system-view

Create an IPsec profile and enter
its view

ipsec profile profile-name

Required
By default, no IPsec profile exists.

Specify the IPsec proposals for the
IPsec profile to reference

proposal proposal-name&<1-6>

Required
By default, an IPsec profile
references no IPsec proposals.