beautypg.com

Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual

Page 174

background image

10

Figure 11 Network diagram for IKE configuration

Configuration procedure

1.

Configure Device A

# Configure an IKE peer.

system-view

[DeviceA] ike peer peer

[DeviceA-ike-peer-peer] pre-shared-key abcde

[DeviceA-ike-peer-peer] remote-address 2.2.2.2

[DeviceA-ike-peer-peer] quit

# Create an IKE proposal numbered 10.

[DeviceA] ike proposal 10

# Set the authentication algorithm to MD5.

[DeviceA-ike-proposal-10] authentication-algorithm md5

# Set the authentication method to pre-shared key.

[DeviceA-ike-proposal-10] authentication-method pre-share

# Set the ISAKMP SA lifetime to 5,000 seconds.

[DeviceA-ike-proposal-10] sa duration 5000

2.

Configure Device B

# Configure an IKE peer.

system-view

[DeviceB] ike peer peer

[DeviceB-ike-peer-peer] pre-shared-key abcde

[DeviceB-ike-peer-peer] remote-address 1.1.1.1

With the configuration, Device A and Device B should be able to perform IKE negotiation. Device A is
configured with proposal 10, which uses the authentication algorithm of MD5; Device B has only a

default IKE proposal, which uses the authentication algorithm of SHA. Therefore, Device B has no

proposal matching proposal 10 of Device A, and the two devices have only one pair of matching

proposals, namely the default IKE proposals. In addition, the two devices are not required to have the
same ISAKMP SA lifetime; they will negotiate one.