beautypg.com

Configuring secpath b – H3C Technologies H3C SecPath F1000-E User Manual

Page 224

background image

212

# Create IKE peer peer.

[SecPathA] ike peer peer

# Set the pre-shared key.

[SecPathA-ike-peer-peer] pre-shared-key abcde

# Specify the IP address of the peer security gateway.

[SecPathA-ike-peer-peer] remote-address 2.2.2.2

[SecPathA-ike-peer-peer] quit

# Create an IPsec policy that uses IKE.

[SecPathA] ipsec policy map1 10 isakmp

# Reference IPsec proposal tran1.

[SecPathA-ipsec-policy-isakmp-map1-10] proposal tran1

# Reference ACL 3101 to identify the protected traffic.

[SecPathA-ipsec-policy-isakmp-map1-10] security acl 3101

# Reference IKE peer peer.

[SecPathA-ipsec-policy-isakmp-map1-10] ike-peer peer

# Enable dynamic IPsec RRI and use 1.1.1.2 as the next hop of the static route.

[SecPathA-ipsec-policy-isakmp-map1-10] reverse-route remote-peer 1.1.1.2

[SecPathA-ipsec-policy-isakmp-map1-10] quit

# Apply IPsec policy map1 to interface GigabitEthernet 0/1.

[SecPathA] interface GigabitEthernet 0/1

[SecPathA-GigabitEthernet0/1] ipsec policy map1

[SecPathA-GigabitEthernet0/1] quit

Configuring SecPath B

NOTE:

Assign IPv4 Address to the interfaces. Make sure that SecPath A and SecPath B have IP connectivity
between them.

# Configure ACL 3101 to identify traffic from subnet 10.5.5.0/24 to subnet 10.4.4.0/24.

system-view

[SecPathB] acl number 3101

[SecPathB-acl-adv-3101] rule permit ip source 10.5.5.0 0.0.0.255 destination

10.4.4.0

0.0.0.255

[SecPathB-acl-adv-3101] quit

# Configure a static route to subnet 10.4.4.0/24.

[SecPathB] ip route-static 10.4.4.0 255.255.255.0 1.1.1.1

# Create IPsec proposal tran1.

[SecPathB] ipsec proposal tran1

# Set the packet encapsulation mode to tunnel.

[SecPathB-ipsec-proposal-tran1] encapsulation-mode tunnel

# Use ESP as the security protocol.

[SecPathB-ipsec-proposal-tran1] transform esp

# Use DES as the encryption algorithm and SHA1-HMAC-96 as the authentication algorithm.