beautypg.com

Verifying the configuration – H3C Technologies H3C SecPath F1000-E User Manual

Page 225

background image

213

[SecPathB-ipsec-proposal-tran1] esp encryption-algorithm des

[SecPathB-ipsec-proposal-tran1] esp authentication-algorithm sha1

[SecPathB-ipsec-proposal-tran1] quit

# Create IKE peer peer.

[SecPathB] ike peer peer

# Set the pre-shared key.

[SecPathB-ike-peer-peer] pre-shared-key abcde

# Specify the IP address of the peer security gateway.

[SecPathB-ike-peer-peer] remote-address 1.1.1.1

[SecPathB-ike-peer-peer] quit

# Create an IPsec policy that uses IKE.

[SecPathB] ipsec policy use1 10 isakmp

# Reference ACL 3101 to identify the protected traffic.

[SecPathB-ipsec-policy-isakmp-use1-10] security acl 3101

# Reference IPsec proposal tran1.

[SecPathB-ipsec-policy-isakmp-use1-10] proposal tran1

# Reference IKE peer peer.

[SecPathB-ipsec-policy-isakmp-use1-10] ike-peer peer

[SecPathB-ipsec-policy-isakmp-use1-10] quit

# Apply IPsec policy use1 to interface GigabitEthernet 0/1.

[SecPathB] interface GigabitEthernet 0/1

[SecPathB-GigabitEthernet0/1] ipsec policy use1

Verifying the configuration

# Send traffic from subnet 10.5.5.0/24 to subnet 10.4.4.0/24 or from subnet 10.4.4.0/24 to
10.5.5.0/24. IKE negotiation is triggered to establish IPsec SAs between SecPath A and SecPath B.
# Display the routing table on SecPath A.

[SecPathA] display ip routing-table

Routing Tables: Public

Destinations : 8 Routes : 8

Destination/Mask Proto Pre Cost NextHop Interface

1.1.0.0/16 Direct 0 0 1.1.1.1 GE0/1

1.1.1.1/32 Direct 0 0 127.0.0.1 InLoop0

2.2.2.0/24 Static 60 0 1.1.1.2 GE0/1

10.4.4.0/24 Direct 0 0 10.4.4.1 GE0/2

10.4.4.4/32 Direct 0 0 127.0.0.1 InLoop0

10.5.5.0/24 Static 60 0 1.1.1.2 GE0/1

127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0

127.0.0.1/32 Direct 0 0 127.0.0.1 InLoop0

The output shows that IPsec RRI has created a static route to subnet 10.5.5.0/24 with the next hop 1.1.1.2.
# Delete the IPsec SAs. The static route is automatically deleted.