Configuration prerequisites, Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual
Page 191
179
•
Required configuration: The IPsec proposals and IKE peer.
•
Optional configuration: The ACL, PFS feature, and SA lifetime. Unlike the direct configuration, ACL
configuration to be referenced by an IPsec policy is optional. The responder without ACL
configuration accepts the initiator's ACL configuration.
Configuration prerequisites
Configure the ACLs and the IKE peer for the IPsec policy. For more information about IKE configuration,
see "Configuring IKE."
The parameters for the local and remote ends must match.
Configuration procedure
When configuring an IPsec policy that uses IKE, follow these guidelines:
•
You cannot change the parameters of an IPsec policy created by referencing an IPsec policy
template directly in IPsec policy view. You can perform the required changes in IPsec policy
template view.
•
An IPsec policy can reference only one ACL. If you apply multiple ACLs to an IPsec policy, only the
last one takes effect.
•
With SAs to be established through IKE negotiation, an IPsec policy can reference up to six IPsec
proposals. During negotiation, IKE searches for a fully matched IPsec proposal at the two ends of
the expected IPsec tunnel. If no match is found, no SA can be set up and the packets expecting to
be protected will be dropped.
•
During IKE negotiation for an IPsec policy with PFS enabled, an additional key exchange is
performed. If the local end uses PFS, the remote end must also use PFS for negotiation and both
ends must use the same Diffie-Hellman (DH) group; otherwise, the negotiation will fail.
•
You can set both the time-based SA lifetime and the traffic-based SA lifetime. Once the time-based
lifetime or traffic-based lifetime of an SA elapses, the SA is aged.
•
An SA uses the global lifetime settings when it is not configured with lifetime settings in IPsec policy
view. When negotiating to set up SAs, IKE uses the local lifetime settings or those proposed by the
peer, whichever are smaller.
•
You cannot change the creation mode of an IPsec policy between the two, directly configuration
and configuration by referencing an IPsec policy template. To create an IPsec policy in another
creation mode, delete the current one and then configure a new IPsec policy.
To directly configure an IPsec policy that uses IKE:
Step Command
Remark
1.
Enter system view.
system-view
N/A
2.
Create an IPsec policy that
uses IKE and enter its view.
ipsec policy policy-name
seq-number isakmp
By default, no IPsec policy exists.
3.
Configure an IPsec connection
name.
connection-name name
Optional.
By default, no IPsec connection name is
configured.
4.
Assign an ACL to the IPsec
policy.
security acl acl-number
[ aggregation ]
By default, an IPsec policy references no
ACL.
5.
Assign IPsec proposals to the
IPsec policy.
proposal
proposal-name&<1-6>
By default, an IPsec policy references no
IPsec proposal.
- H3C SecPath F5000-A5 Firewall H3C SecPath F1000-A-EI H3C SecPath F1000-E-SI H3C SecPath F1000-S-AI H3C SecPath F5000-S Firewall H3C SecPath F5000-C Firewall H3C SecPath F100-C-SI H3C SecPath F1000-C-SI H3C SecPath F100-A-SI H3C SecBlade FW Cards H3C SecBlade FW Enhanced Cards H3C SecPath U200-A U200-M U200-S H3C SecPath U200-CA U200-CM U200-CS