beautypg.com

Ike configuration example, Network requirements, Configuration procedure – H3C Technologies H3C SecPath F1000-E User Manual

Page 709

background image

12

IKE Configuration Example

Network requirements

As shown in

Figure 11

, an IPsec tunnel is established through IKE negotiation between the security

gateways Device A and Device B to allow secure communication between Host A and Host B.

Device A is configured with an IKE proposal using the sequence number of 10 and the
authentication algorithm of MD5. Device B uses the default IKE proposal.

The two devices use the pre-shared key authentication method.

Figure 11 Network diagram for IKE configuration

Configuration procedure

Step1

Configure security gateway Device A

# Configure the IKE peer.

Select VPN > IKE > Peer from the navigation tree and then click Add. Perform the configurations

shown in

Figure 12

.

This manual is related to the following products: